Versions Packages Information History CVEs Related Badges Report

Versions for gtk

1152 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
gtk4 4.8.3 - sheila@vulpine.house
Adélie Linux current
user
gtk4-dbg 4.8.3 - sheila@vulpine.house
Adélie Linux current
user
gtk4-dev 4.8.3 - sheila@vulpine.house
Adélie Linux current
user
gtk4-doc 4.8.3 - sheila@vulpine.house
Adélie Linux current
user
gtk+3.0 3.24.30 - fallback-mnt-adelie@repology
Adélie Linux current
user
gtk+3.0-dbg 3.24.30 - fallback-mnt-adelie@repology
Adélie Linux current
user
gtk+3.0-dev 3.24.30 - fallback-mnt-adelie@repology
Adélie Linux current
user
gtk+3.0-doc 3.24.30 - fallback-mnt-adelie@repology
Adélie Linux current
user
gtk+3.0-lang 3.24.30 - fallback-mnt-adelie@repology
Adélie Linux current
user
gtk+2.0 2.24.32 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
gtk+2.0-dbg 2.24.32 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
gtk+2.0-dev 2.24.32 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
gtk+2.0-doc 2.24.32 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
gtk+2.0-lang 2.24.32 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
gtk-update-icon-cache 2.24.32 Potentially vulnerable - awilfox@adelielinux.org
AIX Open Source Packages gtk2 2.20.1 Potentially vulnerable - -
AIX Open Source Packages gtk2 2.20.1 Potentially vulnerable - -
AIX Open Source Packages gtk2 2.18.9 Potentially vulnerable - -
AIX Open Source Packages gtk2 2.18.9 Potentially vulnerable - -
AIX Open Source Packages gtk2 2.18.9 Potentially vulnerable - -
AIX Open Source Packages gtk2 2.18.9 Potentially vulnerable - -
AIX Open Source Packages gtk2 2.18.7 Potentially vulnerable - -
AIX Open Source Packages gtk2 2.18.7 Potentially vulnerable - -
AIX Open Source Packages gtk2 2.18.6 Potentially vulnerable - -
AIX Open Source Packages gtk2 2.18.6 Potentially vulnerable - -
AIX Open Source Packages gtk2 2.18.5 Potentially vulnerable - -
AIX Open Source Packages gtk2 2.18.5 Potentially vulnerable - -
AIX Open Source Packages gtk2 2.18.3 Potentially vulnerable - -
AIX Open Source Packages gtk2 2.16.6 Potentially vulnerable - -
AIX Open Source Packages gtk2 2.16.4 Potentially vulnerable - -
AIX Open Source Packages gtk+ 1.2.10 Potentially vulnerable - -
AIX Open Source Packages gtk+ 1.2.10 Potentially vulnerable - -
AIX Toolbox gtk2 2.24.30 Potentially vulnerable System Environment/Libraries -
AIX Toolbox gtk+ 1.2.10 Potentially vulnerable System Environment/Libraries -
AlmaLinux 8
AppStream
gtk3 3.22.30 Unspecified packager@almalinux.org
AlmaLinux 8
AppStream
gtk3 3.22.30 Unspecified packager@almalinux.org
AlmaLinux 8
AppStream
gtk2 2.24.32 Potentially vulnerable System Environment/Libraries packager@almalinux.org
AlmaLinux 9
AppStream
gtk4 4.12.3 Unspecified packager@almalinux.org
AlmaLinux 9
AppStream
gtk3 3.24.31 Unspecified packager@almalinux.org
AlmaLinux 9
AppStream
gtk2 2.24.33 Potentially vulnerable Unspecified packager@almalinux.org
Alpine Linux 3.15
community
gtk4.0-demo 4.4.1 - oss@cogitri.dev
Alpine Linux 3.15
community
gtk4.0-dev 4.4.1 - oss@cogitri.dev
Alpine Linux 3.15
community
gtk4.0-doc 4.4.1 - oss@cogitri.dev
Alpine Linux 3.15
community
gtk4.0-dbg 4.4.1 - oss@cogitri.dev
Alpine Linux 3.15
community
gtk4.0-lang 4.4.1 - oss@cogitri.dev
Alpine Linux 3.15
community
gtk4.0 4.4.1 - oss@cogitri.dev
Alpine Linux 3.15
main
gtk+3.0-doc 3.24.30 - oss@cogitri.dev
Alpine Linux 3.15
main
gtk+3.0 3.24.30 - oss@cogitri.dev
Alpine Linux 3.15
main
gtk+3.0-dev 3.24.30 - oss@cogitri.dev
Alpine Linux 3.15
main
gtk+3.0-dbg 3.24.30 - oss@cogitri.dev
Alpine Linux 3.15
main
gtk+3.0-lang 3.24.30 - oss@cogitri.dev
Alpine Linux 3.15
main
gtk+3.0-demo 3.24.30 - oss@cogitri.dev
Alpine Linux 3.15
main
gtk+2.0-dbg 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
gtk+2.0-doc 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
gtk-update-icon-cache 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
gtk+2.0-lang 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
gtk+2.0-dev 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
gtk+2.0 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
gtk+-dev 2.24.31 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
gtk+ 2.24.31 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
gtk4.0-doc 4.6.4 - ablocorrea@hotmail.com
Alpine Linux 3.16
community
gtk4.0-lang 4.6.4 - ablocorrea@hotmail.com
Alpine Linux 3.16
community
gtk4.0-demo 4.6.4 - ablocorrea@hotmail.com
Alpine Linux 3.16
community
gtk4.0-dev 4.6.4 - ablocorrea@hotmail.com
Alpine Linux 3.16
community
gtk4.0-dbg 4.6.4 - ablocorrea@hotmail.com
Alpine Linux 3.16
community
gtk4.0 4.6.4 - ablocorrea@hotmail.com
Alpine Linux 3.16
main
gtk+3.0-demo 3.24.41 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
gtk+3.0-lang 3.24.41 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
gtk+3.0 3.24.41 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
gtk+3.0-dev 3.24.41 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
gtk-update-icon-cache 3.24.41 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
gtk+3.0-doc 3.24.41 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
gtk+3.0-dbg 3.24.41 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
gtk+2.0-doc 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
gtk-update-icon-cache 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
gtk+2.0 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
gtk+2.0-dev 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
gtk+2.0-lang 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
gtk+2.0-dbg 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
gtk+ 2.24.31 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
gtk+-dev 2.24.31 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
gtk4.0-doc 4.8.3 - ablocorrea@hotmail.com
Alpine Linux 3.17
community
gtk4.0-dev 4.8.3 - ablocorrea@hotmail.com
Alpine Linux 3.17
community
gtk4.0 4.8.3 - ablocorrea@hotmail.com
Alpine Linux 3.17
community
gtk4.0-demo 4.8.3 - ablocorrea@hotmail.com
Alpine Linux 3.17
community
gtk4.0-dbg 4.8.3 - ablocorrea@hotmail.com
Alpine Linux 3.17
community
gtk4.0-lang 4.8.3 - ablocorrea@hotmail.com
Alpine Linux 3.17
main
gtk+3.0-doc 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.17
main
gtk+3.0 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.17
main
gtk+3.0-dbg 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.17
main
gtk-update-icon-cache 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.17
main
gtk+3.0-demo 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.17
main
gtk+3.0-dev 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.17
main
gtk+3.0-lang 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.17
community
gtk+2.0-doc 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
gtk+2.0-lang 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
gtk+2.0 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
gtk+2.0-dev 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
gtk+2.0-dbg 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
community
gtk4.0 4.10.5 - ablocorrea@hotmail.com
Alpine Linux 3.18
community
gtk4.0-dbg 4.10.5 - ablocorrea@hotmail.com
Alpine Linux 3.18
community
gtk4.0-demo 4.10.5 - ablocorrea@hotmail.com
Alpine Linux 3.18
community
gtk4.0-dev 4.10.5 - ablocorrea@hotmail.com
Alpine Linux 3.18
community
gtk4.0-doc 4.10.5 - ablocorrea@hotmail.com
Alpine Linux 3.18
community
gtk4.0-lang 4.10.5 - ablocorrea@hotmail.com
Alpine Linux 3.18
main
gtk+3.0 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.18
main
gtk+3.0-dbg 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.18
main
gtk+3.0-demo 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.18
main
gtk+3.0-dev 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.18
main
gtk+3.0-doc 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.18
main
gtk+3.0-lang 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.18
main
gtk-update-icon-cache 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.18
community
gtk+2.0 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
community
gtk+2.0-dbg 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
community
gtk+2.0-dev 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
community
gtk+2.0-doc 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
community
gtk+2.0-lang 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
community
gtk4.0 4.12.5 - ablocorrea@hotmail.com
Alpine Linux 3.19
community
gtk4.0-dbg 4.12.5 - ablocorrea@hotmail.com
Alpine Linux 3.19
community
gtk4.0-demo 4.12.5 - ablocorrea@hotmail.com
Alpine Linux 3.19
community
gtk4.0-dev 4.12.5 - ablocorrea@hotmail.com
Alpine Linux 3.19
community
gtk4.0-doc 4.12.5 - ablocorrea@hotmail.com
Alpine Linux 3.19
community
gtk4.0-lang 4.12.5 - ablocorrea@hotmail.com
Alpine Linux 3.19
main
gtk+3.0 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.19
main
gtk+3.0-dbg 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.19
main
gtk+3.0-demo 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.19
main
gtk+3.0-dev 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.19
main
gtk+3.0-doc 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.19
main
gtk+3.0-lang 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.19
main
gtk-update-icon-cache 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.19
community
gtk+2.0 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
community
gtk+2.0-dbg 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
community
gtk+2.0-dev 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
community
gtk+2.0-doc 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
community
gtk+2.0-lang 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
community
gtk4.0 4.14.4 - ablocorrea@hotmail.com
Alpine Linux 3.20
community
gtk4.0-dbg 4.14.4 - ablocorrea@hotmail.com
Alpine Linux 3.20
community
gtk4.0-demo 4.14.4 - ablocorrea@hotmail.com
Alpine Linux 3.20
community
gtk4.0-dev 4.14.4 - ablocorrea@hotmail.com
Alpine Linux 3.20
community
gtk4.0-doc 4.14.4 - ablocorrea@hotmail.com
Alpine Linux 3.20
community
gtk4.0-lang 4.14.4 - ablocorrea@hotmail.com
Alpine Linux 3.20
main
gtk+3.0 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.20
main
gtk+3.0-dbg 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.20
main
gtk+3.0-demo 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.20
main
gtk+3.0-dev 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.20
main
gtk+3.0-doc 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.20
main
gtk+3.0-lang 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.20
main
gtk-update-icon-cache 3.24.43 - newbyte@postmarketos.org
Alpine Linux 3.20
community
gtk+2.0 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
community
gtk+2.0-dbg 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
community
gtk+2.0-dev 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
community
gtk+2.0-doc 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
community
gtk+2.0-lang 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
community
gtk4.0 4.16.13 - pabloyoyoista@postmarketos.org
Alpine Linux 3.21
community
gtk4.0-dbg 4.16.13 - pabloyoyoista@postmarketos.org
Alpine Linux 3.21
community
gtk4.0-demo 4.16.13 - pabloyoyoista@postmarketos.org
Alpine Linux 3.21
community
gtk4.0-dev 4.16.13 - pabloyoyoista@postmarketos.org
Alpine Linux 3.21
community
gtk4.0-doc 4.16.13 - pabloyoyoista@postmarketos.org
Alpine Linux 3.21
community
gtk4.0-lang 4.16.13 - pabloyoyoista@postmarketos.org
Alpine Linux 3.21
main
gtk+3.0 3.24.49 - newbyte@postmarketos.org
Alpine Linux 3.21
main
gtk+3.0-dbg 3.24.49 - newbyte@postmarketos.org
Alpine Linux 3.21
main
gtk+3.0-demo 3.24.49 - newbyte@postmarketos.org
Alpine Linux 3.21
main
gtk+3.0-dev 3.24.49 - newbyte@postmarketos.org
Alpine Linux 3.21
main
gtk+3.0-doc 3.24.49 - newbyte@postmarketos.org
Alpine Linux 3.21
main
gtk+3.0-lang 3.24.49 - newbyte@postmarketos.org
Alpine Linux 3.21
main
gtk-update-icon-cache 3.24.49 - newbyte@postmarketos.org
Alpine Linux 3.21
community
gtk+2.0 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
community
gtk+2.0-dbg 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
community
gtk+2.0-dev 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
community
gtk+2.0-doc 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
community
gtk+2.0-lang 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
community
gtk4.0 4.18.6 - pabloyoyoista@postmarketos.org
Alpine Linux 3.22
community
gtk4.0-dbg 4.18.6 - pabloyoyoista@postmarketos.org
Alpine Linux 3.22
community
gtk4.0-demo 4.18.6 - pabloyoyoista@postmarketos.org
Alpine Linux 3.22
community
gtk4.0-dev 4.18.6 - pabloyoyoista@postmarketos.org
Alpine Linux 3.22
community
gtk4.0-doc 4.18.6 - pabloyoyoista@postmarketos.org
Alpine Linux 3.22
community
gtk4.0-lang 4.18.6 - pabloyoyoista@postmarketos.org
Alpine Linux 3.22
main
gtk+3.0 3.24.49 - newbyte@postmarketos.org
Alpine Linux 3.22
main
gtk+3.0-dbg 3.24.49 - newbyte@postmarketos.org
Alpine Linux 3.22
main
gtk+3.0-demo 3.24.49 - newbyte@postmarketos.org
Alpine Linux 3.22
main
gtk+3.0-dev 3.24.49 - newbyte@postmarketos.org
Alpine Linux 3.22
main
gtk+3.0-doc 3.24.49 - newbyte@postmarketos.org
Alpine Linux 3.22
main
gtk+3.0-lang 3.24.49 - newbyte@postmarketos.org
Alpine Linux 3.22
main
gtk-update-icon-cache 3.24.49 - newbyte@postmarketos.org
Alpine Linux 3.22
community
gtk+2.0 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
community
gtk+2.0-dbg 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
community
gtk+2.0-dev 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
community
gtk+2.0-doc 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
community
gtk+2.0-lang 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
gtk4.0 4.18.6 - pabloyoyoista@postmarketos.org
Alpine Linux Edge
community
gtk4.0-dbg 4.18.6 - pabloyoyoista@postmarketos.org
Alpine Linux Edge
community
gtk4.0-demo 4.18.6 - pabloyoyoista@postmarketos.org
Alpine Linux Edge
community
gtk4.0-dev 4.18.6 - pabloyoyoista@postmarketos.org
Alpine Linux Edge
community
gtk4.0-doc 4.18.6 - pabloyoyoista@postmarketos.org
Alpine Linux Edge
community
gtk4.0-lang 4.18.6 - pabloyoyoista@postmarketos.org
Alpine Linux Edge
main
gtk+3.0 3.24.49 - newbyte@postmarketos.org
Alpine Linux Edge
main
gtk+3.0-dbg 3.24.49 - newbyte@postmarketos.org
Alpine Linux Edge
main
gtk+3.0-demo 3.24.49 - newbyte@postmarketos.org
Alpine Linux Edge
main
gtk+3.0-dev 3.24.49 - newbyte@postmarketos.org
Alpine Linux Edge
main
gtk+3.0-doc 3.24.49 - newbyte@postmarketos.org
Alpine Linux Edge
main
gtk+3.0-lang 3.24.49 - newbyte@postmarketos.org
Alpine Linux Edge
main
gtk-update-icon-cache 3.24.49 - newbyte@postmarketos.org
Alpine Linux Edge
community
gtk+2.0 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
gtk+2.0-dbg 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
gtk+2.0-dev 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
gtk+2.0-doc 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
gtk+2.0-lang 2.24.33 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 libgtk+3 3.24.29 System/Libraries manowar@altlinux.org
ALT Linux p9 libgtk+2 2.24.32 Potentially vulnerable System/Libraries aris@altlinux.org
ALT Linux p10 libgtk4 4.4.1 System/Libraries aris@altlinux.org
ALT Linux p10 libgtk+3 3.24.32 System/Libraries aris@altlinux.org
ALT Linux p10 libgtk+2 2.24.33 Potentially vulnerable System/Libraries aris@altlinux.org
ALT Linux p11 libgtk4 4.16.12 System/Libraries aris@altlinux.org
ALT Linux p11 libgtk+3 3.24.48 System/Libraries aris@altlinux.org
ALT Linux p11 libgtk+2 2.24.33 Potentially vulnerable System/Libraries aris@altlinux.org
ALT Sisyphus libgtk4 4.18.6 System/Libraries aris@altlinux.org
ALT Sisyphus libgtk+3 3.24.49 System/Libraries aris@altlinux.org
ALT Sisyphus libgtk+2 2.24.33 Potentially vulnerable System/Libraries aris@altlinux.org
Amazon Linux 2 gtk3 3.22.30 Unspecified -
Amazon Linux 2 gtk3 3.22.30 Unspecified -
Amazon Linux 2 gtk3 3.22.26 Unspecified -
Amazon Linux 2 gtk3 3.22.10 Unspecified -
Amazon Linux 2 gtk2 2.24.31 Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 gtk2 2.24.31 Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 gtk2 2.24.31 Potentially vulnerable System Environment/Libraries -
AOSC gtk-update-icon-cache 4.18.5 x11 fallback-mnt-aosc@repology
AOSC gtk-4 4.18.5 x11 fallback-mnt-aosc@repology
AOSC gtk-3 3.24.43 x11 fallback-mnt-aosc@repology
AOSC gtk-3+32 3.24.43 x11 fallback-mnt-aosc@repology
AOSC gtk-2+32 2.24.33 Potentially vulnerable x11 fallback-mnt-aosc@repology
AOSC gtk-2 2.24.33 Potentially vulnerable x11 fallback-mnt-aosc@repology
Apertis v2023
v2023/target
gtk+3.0 3.24.24 - pkg-gnome-maintainers@lists.alioth.debian.org, smcv@debian.org
Apertis v2023
v2023/development
gtk+2.0 2.24.33 Potentially vulnerable - pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, pochu@debian.org
Apertis v2024
v2024/target
gtk4 4.8.3 - pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, smcv@debian.org
Apertis v2024
v2024/target
gtk+3.0 3.24.38 - pkg-gnome-maintainers@lists.alioth.debian.org, mitya57@debian.org, smcv@debian.org
Apertis v2024
v2024/development
gtk+2.0 2.24.33 Potentially vulnerable - pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, pochu@debian.org
Apertis v2025
v2025/target
gtk4 4.8.3 - pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, smcv@debian.org
Apertis v2025
v2025/target
gtk+3.0 3.24.38 - pkg-gnome-maintainers@lists.alioth.debian.org, mitya57@debian.org, smcv@debian.org
Apertis v2025
v2025/development
gtk+2.0 2.24.33 Potentially vulnerable - pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, pochu@debian.org
Apertis v2026 Development
v2026dev1/target
gtk4 4.8.3 - pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, smcv@debian.org
Apertis v2026 Development
v2026dev1/target
gtk+3.0 3.24.38 - pkg-gnome-maintainers@lists.alioth.debian.org, mitya57@debian.org, smcv@debian.org
Apertis v2026 Development
v2026dev1/development
gtk+2.0 2.24.33 Potentially vulnerable - pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, pochu@debian.org
Arch Linux
extra
gtk4-docs 4.18.6 - -
Arch Linux
extra
gtk4-demos 4.18.6 - -
Arch Linux
extra
gtk4 4.18.6 - -
Arch Linux
extra
gtk-update-icon-cache 4.18.6 - -
Arch Linux
extra
gtk3-docs 3.24.49 - -
Arch Linux
extra
gtk3-demos 3.24.49 - -
Arch Linux
extra
gtk3 3.24.49 - -
Arch Linux
multilib
lib32-gtk3 3.24.49 - -
Arch Linux
extra
gtk2 2.24.33 Potentially vulnerable - -
Arch Linux
multilib
lib32-gtk2 2.24.33 Potentially vulnerable - -
Arch Linux 32 i486
extra
gtk4-docs 4.10.3 - -
Arch Linux 32 i486
extra
gtk4 4.10.3 - -
Arch Linux 32 i486
extra
gtk4-demos 4.10.3 - -
Arch Linux 32 i486
extra
gtk-update-icon-cache 4.10.3 - -
Arch Linux 32 i486
extra
gtk3-docs 3.24.37 - -
Arch Linux 32 i486
extra
gtk3-demos 3.24.37 - -
Arch Linux 32 i486
extra
gtk3 3.24.37 - -
Arch Linux 32 i486
extra
gtk2 2.24.33 Potentially vulnerable - -
Arch Linux 32 i686
extra
gtk4-docs 4.16.7 - -
Arch Linux 32 i686
extra
gtk4-demos 4.16.7 - -
Arch Linux 32 i686
extra
gtk4 4.16.7 - -
Arch Linux 32 i686
extra
gtk-update-icon-cache 4.16.7 - -
Arch Linux 32 i686
extra
gtk3 3.24.43 - -
Arch Linux 32 i686
extra
gtk3-docs 3.24.43 - -
Arch Linux 32 i686
extra
gtk3-demos 3.24.43 - -
Arch Linux 32 i686
extra
gtk2 2.24.33 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
gtk4 4.16.7 - -
Arch Linux 32 pentium4
extra
gtk-update-icon-cache 4.16.7 - -
Arch Linux 32 pentium4
extra
gtk4-demos 4.16.7 - -
Arch Linux 32 pentium4
extra
gtk4-docs 4.16.7 - -
Arch Linux 32 pentium4
extra
gtk3 3.24.43 - -
Arch Linux 32 pentium4
extra
gtk3-demos 3.24.43 - -
Arch Linux 32 pentium4
extra
gtk3-docs 3.24.43 - -
Arch Linux 32 pentium4
extra
gtk2 2.24.33 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
gtk4 4.18.6 - -
Arch Linux ARM aarch64
extra
gtk4-docs 4.18.6 - -
Arch Linux ARM aarch64
extra
gtk4-demos 4.18.6 - -
Arch Linux ARM aarch64
extra
gtk-update-icon-cache 4.18.6 - -
Arch Linux ARM aarch64
extra
gtk3 3.24.49 - -
Arch Linux ARM aarch64
extra
gtk3-demos 3.24.49 - -
Arch Linux ARM aarch64
extra
gtk3-docs 3.24.49 - -
Arch Linux ARM aarch64
extra
gtk2 2.24.33 Potentially vulnerable - -
ArchPOWER powerpc gtk-update-icon-cache 4.18.4 - -
ArchPOWER powerpc gtk4-demos 4.18.4 - -
ArchPOWER powerpc gtk4-docs 4.18.4 - -
ArchPOWER powerpc gtk4 4.18.4 - -
ArchPOWER powerpc gtk3-docs 3.24.49 - -
ArchPOWER powerpc gtk3-demos 3.24.49 - -
ArchPOWER powerpc gtk3 3.24.49 - -
ArchPOWER powerpc gtk2 2.24.33 Potentially vulnerable - -
ArchPOWER powerpc64le gtk-update-icon-cache 4.18.4 - -
ArchPOWER powerpc64le gtk4-demos 4.18.4 - -
ArchPOWER powerpc64le gtk4 4.18.4 - -
ArchPOWER powerpc64le gtk4-docs 4.18.4 - -
ArchPOWER powerpc64le gtk3-demos 3.24.49 - -
ArchPOWER powerpc64le gtk3-docs 3.24.49 - -
ArchPOWER powerpc64le gtk3 3.24.49 - -
ArchPOWER powerpc64le gtk2 2.24.33 Potentially vulnerable - -
ArchPOWER riscv64 gtk4-demos 4.16.12 - -
ArchPOWER riscv64 gtk4 4.16.12 - -
ArchPOWER riscv64 gtk-update-icon-cache 4.16.12 - -
ArchPOWER riscv64 gtk4-docs 4.16.12 - -
ArchPOWER riscv64 gtk3 3.24.49 - -
ArchPOWER riscv64 gtk3-demos 3.24.49 - -
ArchPOWER riscv64 gtk3-docs 3.24.49 - -
ArchPOWER riscv64 gtk2 2.24.33 Potentially vulnerable - -
AUR gtk4-git 4.16.3.r424.ge37f9ba - xiota@aur
AUR gtk4-demos-git 4.16.3.r424.ge37f9ba - xiota@aur
AUR gtk-update-icon-cache-git 4.16.3.r424.ge37f9ba - xiota@aur
AUR gtk3-git 3.24.41.r22.gc4dd8d0125 - fallback-mnt-aur@repology
AUR gtk3-demos-git 3.24.41.r22.gc4dd8d0125 - fallback-mnt-aur@repology
AUR gtk3-docs-git 3.24.41.r22.gc4dd8d0125 - fallback-mnt-aur@repology
AUR lib32-gtk4 4.18.6 - vitaliikuzhdin@aur
AUR mingw-w64-gtk4 4.14.1 - fallback-mnt-aur@repology
AUR mingw-w64-gtk3 3.24.41 - fallback-mnt-aur@repology
AUR mingw-w64-gtk2 2.24.33 Potentially vulnerable - lantw44@aur
AUR gtk 1.2.10 Potentially vulnerable - connorbehan@aur
AUR lib32-gtk 1.2.10 Potentially vulnerable - prg@aur, salmonix@aur
Artix
world
gtk4-docs 4.18.6 - -
Artix
world
gtk4 4.18.6 - -
Artix
world
gtk-update-icon-cache 4.18.6 - -
Artix
world
gtk4-demos 4.18.6 - -
Artix
world
gtk3 3.24.49 - -
Artix
world
gtk3-demos 3.24.49 - -
Artix
world
gtk3-docs 3.24.49 - -
Artix
lib32
lib32-gtk3 3.24.49 - -
Artix
world
gtk2 2.24.33 Potentially vulnerable - -
Artix
lib32
lib32-gtk2 2.24.33 Potentially vulnerable - -
Carbs Linux
extra
gtk4 4.16.3 - cem@carbslinux.org
Carbs Linux
extra
gtk+3 3.24.43 - cem@carbslinux.org
CentOS 6
os
gtk2 2.24.23 Potentially vulnerable System Environment/Libraries -
CentOS 7
os
gtk3 3.22.30 Unspecified -
CentOS 7
updates
gtk3 3.22.30 Unspecified -
CentOS 7
updates
gtk3 3.22.30 Unspecified -
CentOS 7
os
gtk2 2.24.31 Potentially vulnerable System Environment/Libraries -
CentOS 8
AppStream
gtk3 3.22.30 Unspecified bugs@centos.org
CentOS 8
AppStream
gtk2 2.24.32 Potentially vulnerable System Environment/Libraries bugs@centos.org
CentOS Stream 8
AppStream
gtk3 3.22.30 Unspecified bugs@centos.org
CentOS Stream 8
AppStream
gtk3 3.22.30 Unspecified bugs@centos.org
CentOS Stream 8
AppStream
gtk3 3.22.30 Unspecified bugs@centos.org
CentOS Stream 8
AppStream
gtk3 3.22.30 Unspecified bugs@centos.org
CentOS Stream 8
AppStream
gtk3 3.22.30 Unspecified bugs@centos.org
CentOS Stream 8
AppStream
gtk2 2.24.32 Potentially vulnerable System Environment/Libraries bugs@centos.org
CentOS Stream 9
AppStream
gtk4 4.12.3 Unspecified builder@centos.org
CentOS Stream 9
AppStream
gtk4 4.4.1 Unspecified builder@centos.org
CentOS Stream 9
AppStream
gtk4 4.4.1 Unspecified builder@centos.org
CentOS Stream 9
AppStream
gtk4 4.2.1 Unspecified builder@centos.org
CentOS Stream 9
AppStream
gtk3 3.24.31 Unspecified builder@centos.org
CentOS Stream 9
AppStream
gtk3 3.24.31 Unspecified builder@centos.org
CentOS Stream 9
AppStream
gtk3 3.24.31 Unspecified builder@centos.org
CentOS Stream 9
AppStream
gtk3 3.24.31 Unspecified builder@centos.org
CentOS Stream 9
AppStream
gtk3 3.24.30 Unspecified builder@centos.org
CentOS Stream 9
AppStream
gtk2 2.24.33 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
AppStream
gtk2 2.24.33 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
AppStream
gtk2 2.24.33 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 10
AppStream
gtk4 4.16.7 Unspecified builder@centos.org
CentOS Stream 10
AppStream
gtk4 4.16.7 Unspecified builder@centos.org
CentOS Stream 10
AppStream
gtk4 4.16.3 Unspecified builder@centos.org
CentOS Stream 10
AppStream
gtk4 4.15.3 Unspecified builder@centos.org
CentOS Stream 10
AppStream
gtk4 4.15.3 Unspecified builder@centos.org
CentOS Stream 10
AppStream
gtk3 3.24.43 Unspecified builder@centos.org
CentOS Stream 10
AppStream
gtk3 3.24.43 Unspecified builder@centos.org
CentOS Stream 10
AppStream
gtk3 3.24.43 Unspecified builder@centos.org
CentOS Stream 10
AppStream
gtk3 3.24.42 Unspecified builder@centos.org
Chimera Linux
main
gtk4 4.18.6 - -
Chimera Linux
main
gtk4-cups 4.18.6 - -
Chimera Linux
main
gtk4-demo 4.18.6 - -
Chimera Linux
main
gtk4-demo-man 4.18.6 - -
Chimera Linux
main
gtk4-devel 4.18.6 - -
Chimera Linux
main
gtk4-devel-man 4.18.6 - -
Chimera Linux
main
gtk4-locale 4.18.6 - -
Chimera Linux
main
gtk4-man 4.18.6 - -
Chimera Linux
main
gtk+3 3.24.43 - -
Chimera Linux
main
gtk+3-cups 3.24.43 - -
Chimera Linux
main
gtk+3-demo 3.24.43 - -
Chimera Linux
main
gtk+3-demo-man 3.24.43 - -
Chimera Linux
main
gtk+3-devel 3.24.43 - -
Chimera Linux
main
gtk+3-devel-static 3.24.43 - -
Chimera Linux
main
gtk+3-locale 3.24.43 - -
Chimera Linux
main
gtk+3-man 3.24.43 - -
Chimera Linux
main
gtk+3-update-icon-cache 3.24.43 - -
Chimera Linux
main
gtk+3-update-icon-cache-man 3.24.43 - -
Chromebrew gtk4 4.18.4 - -
Chromebrew gtk3 3.24.49 - -
Chromebrew gtk2 2.24.33-3 Potentially vulnerable - -
ConanCenter gtk 4.7.0 - -
ConanCenter gtk 4.6.2 - -
ConanCenter gtk 4.4.0 - -
ConanCenter gtk 4.3.2 - -
ConanCenter gtk 4.2.1 - -
ConanCenter gtk 4.1.2 - -
ConanCenter gtk 4.0.2 - -
ConanCenter gtk 3.24.24 - -
CRUX 3.6
contrib
gtk4 4.8.1 - tbier@posteo.de
CRUX 3.6
opt
gtk3 3.24.34 - core-ports@crux.nu
CRUX 3.6
opt
gtk 2.24.33 Potentially vulnerable - core-ports@crux.nu
CRUX 3.6
compat-32
gtk-32 2.24.33 Potentially vulnerable - compat-32-ports@crux.nu
CRUX 3.7
opt
gtk4 4.18.5 - tbier@posteo.de
CRUX 3.7
opt
gtk3 3.24.49 - core-ports@crux.nu
CRUX 3.7
opt
gtk 2.24.33 Potentially vulnerable - core-ports@crux.nu
CRUX 3.7
compat-32
gtk-32 2.24.33 Potentially vulnerable - compat-32-ports@crux.nu
CRUX 3.8
opt
gtk4 4.18.6 - tbier@posteo.de
CRUX 3.8
opt
gtk3 3.24.49 - core-ports@crux.nu
CRUX 3.8
opt
gtk 2.24.33 Potentially vulnerable - core-ports@crux.nu
CRUX 3.8
compat-32
gtk-32 2.24.33 Potentially vulnerable - compat-32-ports@crux.nu
Cygwin girepository-Gtk3.0 3.24.49 Libs takashi.yano@cygwin
Cygwin gtk-update-icon-cache 3.24.49 X11 takashi.yano@cygwin
Cygwin gtk3-debuginfo 3.24.49 Debug takashi.yano@cygwin
Cygwin gtk3-demo 3.24.49 X11 takashi.yano@cygwin
Cygwin libgailutil3-devel 3.24.49 Libs takashi.yano@cygwin
Cygwin libgailutil3-doc 3.24.49 Doc takashi.yano@cygwin
Cygwin libgailutil3_0 3.24.49 Libs takashi.yano@cygwin
Cygwin libgtk3-devel 3.24.49 Libs takashi.yano@cygwin
Cygwin libgtk3-doc 3.24.49 Doc takashi.yano@cygwin
Cygwin libgtk3_0 3.24.49 Libs takashi.yano@cygwin
Cygwin mingw64-i686-gtk3 3.22.28 Devel orphaned@cygwin
Cygwin mingw64-x86_64-gtk3 3.22.28 Devel orphaned@cygwin
Cygwin girepository-Gtk2.0 2.24.33 Potentially vulnerable Libs orphaned@cygwin
Cygwin gtk2.0-debuginfo 2.24.33 Potentially vulnerable Debug orphaned@cygwin
Cygwin gtk2.0-demo 2.24.33 Potentially vulnerable X11 orphaned@cygwin
Cygwin gtk2.0-engines-pixmap 2.24.33 Potentially vulnerable X11 orphaned@cygwin
Cygwin gtk2.0-gail 2.24.33 Potentially vulnerable X11 orphaned@cygwin
Cygwin libgailutil-devel 2.24.33 Potentially vulnerable Libs orphaned@cygwin
Cygwin libgailutil-doc 2.24.33 Potentially vulnerable Doc orphaned@cygwin
Cygwin libgailutil18 2.24.33 Potentially vulnerable Libs orphaned@cygwin
Cygwin libgtk2.0-devel 2.24.33 Potentially vulnerable Libs orphaned@cygwin
Cygwin libgtk2.0-doc 2.24.33 Potentially vulnerable Doc orphaned@cygwin
Cygwin libgtk2.0_0 2.24.33 Potentially vulnerable Libs orphaned@cygwin
Cygwin mingw64-i686-gtk2.0 2.24.33 Potentially vulnerable Devel orphaned@cygwin
Cygwin mingw64-i686-gtk2.0-debuginfo 2.24.33 Potentially vulnerable Debug orphaned@cygwin
Cygwin mingw64-x86_64-gtk2.0 2.24.33 Potentially vulnerable Devel orphaned@cygwin
Cygwin mingw64-x86_64-gtk2.0-debuginfo 2.24.33 Potentially vulnerable Debug orphaned@cygwin
Cygwin libgtk1.2_0 1.2.10 Potentially vulnerable Libs orphaned@cygwin
Cygwin gtk1.2-debuginfo 1.2.10 Potentially vulnerable Debug orphaned@cygwin
Cygwin libgtk1.2-devel 1.2.10 Potentially vulnerable Libs orphaned@cygwin
Debian 10
buster/main
gtk+3.0 3.24.5 libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, laney@debian.org
Debian 10
buster/main
gtk+2.0 2.24.32 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, biebl@debian.org, jbicha@debian.org, pochu@debian.org
Debian 11
bullseye/main
gtk+3.0 3.24.24 libs pkg-gnome-maintainers@lists.alioth.debian.org, smcv@debian.org
Debian 11
bullseye/main
gtk+2.0 2.24.33 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, pochu@debian.org
Debian 12
bookworm/main
gtk4 4.8.3 misc pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, smcv@debian.org
Debian 12
bookworm/main
gtk+3.0 3.24.38 libs pkg-gnome-maintainers@lists.alioth.debian.org, mitya57@debian.org, smcv@debian.org
Debian 12
bookworm/main
gtk+2.0 2.24.33 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, pochu@debian.org
Debian 13
trixie/main
gtk4 4.18.5 misc pkg-gnome-maintainers@lists.alioth.debian.org, bandali@ubuntu.com, jbicha@ubuntu.com, smcv@debian.org
Debian 13
trixie/main
gtk+3.0 3.24.49 libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, mitya57@debian.org, smcv@debian.org
Debian 13
trixie/main
gtk+2.0 2.24.33 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, pochu@debian.org
Debian Unstable
sid/main
gtk4 4.18.6 misc pkg-gnome-maintainers@lists.alioth.debian.org, bandali@ubuntu.com, jbicha@ubuntu.com, smcv@debian.org
Debian Unstable
sid/main
gtk+3.0 3.24.49 libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, mitya57@debian.org, smcv@debian.org
Debian Unstable
sid/main
gtk+2.0 2.24.33 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, pochu@debian.org
deepin 20
main
gtk+3.0 3.24.5.10 - pkg-gnome-maintainers@lists.alioth.debian.org
deepin 20
main
gtk+3.0 3.24.5.7 libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, laney@debian.org
deepin 20
main
gtk+2.0 2.24.32.3 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org
deepin 23
main
gtk4 4.16.7 - pkg-gnome-maintainers@lists.alioth.debian.org, bandali@ubuntu.com, jbicha@ubuntu.com, smcv@debian.org
deepin 23
main
gtk+3.0 3.24.41 - pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, mitya57@debian.org, smcv@debian.org
deepin 23
main
gtk+2.0 2.24.33 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, pochu@debian.org
Devuan 3.0
beowulf/main
gtk+3.0 3.24.5 libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, laney@debian.org
Devuan 3.0
beowulf/main
gtk+2.0 2.24.32 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, biebl@debian.org, jbicha@debian.org, pochu@debian.org
Devuan 4.0
chimaera/main
gtk+3.0 3.24.24 libs pkg-gnome-maintainers@lists.alioth.debian.org, smcv@debian.org
Devuan 4.0
chimaera/main
gtk+2.0 2.24.33 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, pochu@debian.org
Devuan Unstable
unstable/main
gtk4 4.18.6 misc pkg-gnome-maintainers@lists.alioth.debian.org, bandali@ubuntu.com, jbicha@ubuntu.com, smcv@debian.org
Devuan Unstable
unstable/main
gtk+3.0 3.24.49 libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, mitya57@debian.org, smcv@debian.org
Devuan Unstable
unstable/main
gtk+2.0 2.24.33 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, pochu@debian.org
distri gtk+ 3.24.18 - -
distri gtk+-2 2.24.32 Potentially vulnerable - -
Endless OS 4.0
core
gtk+3.0 3.24.24 main pkg-gnome-maintainers@lists.alioth.debian.org, smcv@debian.org
Endless OS master
core
gtk4 4.10.5 main pkg-gnome-maintainers@lists.alioth.debian.org, smcv@debian.org
EPEL 6 gtk+ 1.2.10 Potentially vulnerable System Environment/Libraries -
EPEL 7 gtk+ 1.2.10 Potentially vulnerable System Environment/Libraries -
EPEL 10 gtk2 2.24.33 Potentially vulnerable Unspecified -
EuroLinux 8
appstream
gtk3 3.22.30 Unspecified -
EuroLinux 8
appstream
gtk3 3.22.30 Unspecified -
EuroLinux 8
appstream
gtk3 3.22.30 Unspecified -
EuroLinux 8
appstream
gtk3 3.22.30 Unspecified -
EuroLinux 8
appstream
gtk3 3.22.30 Unspecified -
EuroLinux 8
appstream
gtk2 2.24.32 Potentially vulnerable System Environment/Libraries -
EuroLinux 8
appstream
gtk2 2.24.32 Potentially vulnerable System Environment/Libraries -
EuroLinux 9
appstream
gtk4 4.12.3 Unspecified -
EuroLinux 9
appstream
gtk4 4.4.1 Unspecified -
EuroLinux 9
appstream
gtk4 4.4.1 Unspecified -
EuroLinux 9
appstream
gtk3 3.24.31 Unspecified -
EuroLinux 9
appstream
gtk3 3.24.30 Unspecified -
EuroLinux 9
appstream
gtk2 2.24.33 Potentially vulnerable Unspecified -
EuroLinux 9
appstream
gtk2 2.24.33 Potentially vulnerable Unspecified -
EuroLinux 9
appstream
gtk2 2.24.33 Potentially vulnerable Unspecified -
Exherbo
x11
x11-libs/gtk 4.18.6 x11-libs fallback-mnt-exherbo@repology
Exherbo
x11
x11-libs/gtk+ 3.24.49 x11-libs fallback-mnt-exherbo@repology
Exherbo
x11
x11-libs/gtk+ 2.24.33 Potentially vulnerable x11-libs fallback-mnt-exherbo@repology
Fedora 37
updates
gtk4 4.8.3 Unspecified -
Fedora 37
release
gtk4 4.8.2 Unspecified -
Fedora 37
updates
gtk3 3.24.38 Unspecified -
Fedora 37
release
gtk3 3.24.34 Unspecified -
Fedora 37
release
mingw-gtk3 3.24.34 Unspecified -
Fedora 37
release
gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora 37
release
mingw-gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora 37
release
gtk+ 1.2.10 Potentially vulnerable Unspecified -
Fedora 38
updates
gtk4 4.10.5 Unspecified -
Fedora 38
release
gtk4 4.10.1 Unspecified -
Fedora 38
release
mingw-gtk4 4.8.2 Unspecified -
Fedora 38
updates
gtk3 3.24.41 Unspecified -
Fedora 38
release
gtk3 3.24.37 Unspecified -
Fedora 38
updates
mingw-gtk3 3.24.37 Unspecified -
Fedora 38
release
mingw-gtk3 3.24.36 Unspecified -
Fedora 38
release
gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora 38
release
mingw-gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora 38
release
gtk+ 1.2.10 Potentially vulnerable Unspecified -
Fedora 39
updates
gtk4 4.12.5 Unspecified -
Fedora 39
release
gtk4 4.12.3 Unspecified -
Fedora 39
release
mingw-gtk4 4.11.4 Unspecified -
Fedora 39
updates
gtk3 3.24.43 Unspecified -
Fedora 39
release
gtk3 3.24.38 Unspecified -
Fedora 39
release
mingw-gtk3 3.24.38 Unspecified -
Fedora 39
release
gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora 39
release
mingw-gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora 39
release
gtk+ 1.2.10 Potentially vulnerable Unspecified -
Fedora 40
updates
gtk4 4.14.5 Unspecified -
Fedora 40
release
gtk4 4.14.2 Unspecified -
Fedora 40
release
mingw-gtk4 4.11.4 Unspecified -
Fedora 40
updates
gtk3 3.24.43 Unspecified -
Fedora 40
release
gtk3 3.24.41 Unspecified -
Fedora 40
release
mingw-gtk3 3.24.41 Unspecified -
Fedora 40
release
gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora 40
release
mingw-gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora 40
release
gtk+ 1.2.10 Potentially vulnerable Unspecified -
Fedora 41
updates
gtk4 4.16.13 Unspecified -
Fedora 41
release
gtk4 4.16.3 Unspecified -
Fedora 41
updates
mingw-gtk4 4.14.4 Unspecified -
Fedora 41
release
mingw-gtk4 4.14.4 Unspecified -
Fedora 41
updates
mingw-gtk3 3.24.43 Unspecified -
Fedora 41
release
gtk3 3.24.43 Unspecified -
Fedora 41
release
mingw-gtk3 3.24.43 Unspecified -
Fedora 41
updates
mingw-gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora 41
release
gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora 41
release
mingw-gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora 41
release
gtk+ 1.2.10 Potentially vulnerable Unspecified -
Fedora 42
updates
gtk4 4.18.5 Unspecified -
Fedora 42
release
gtk4 4.18.2 Unspecified -
Fedora 42
release
mingw-gtk4 4.14.4 Unspecified -
Fedora 42
release
gtk3 3.24.49 Unspecified -
Fedora 42
release
mingw-gtk3 3.24.43 Unspecified -
Fedora 42
release
gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora 42
release
mingw-gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora 42
release
gtk+ 1.2.10 Potentially vulnerable Unspecified -
Fedora Rawhide
development
gtk4 4.19.1 Unspecified -
Fedora Rawhide
development
mingw-gtk4 4.14.4 Unspecified -
Fedora Rawhide
development
gtk3 3.24.49 Unspecified -
Fedora Rawhide
development
mingw-gtk3 3.24.49 Unspecified -
Fedora Rawhide
development
gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora Rawhide
development
mingw-gtk2 2.24.33 Potentially vulnerable Unspecified -
Fedora Rawhide
development
gtk+ 1.2.10 Potentially vulnerable Unspecified -
FreeBSD Ports x11-toolkits/gtk40 4.18.4 x11-toolkits desktop@freebsd.org
FreeBSD Ports x11-toolkits/gtk30 3.24.49 x11-toolkits desktop@freebsd.org
FreeBSD Ports graphics/gtk-update-icon-cache 3.24.42 graphics desktop@freebsd.org
FreeBSD Ports x11-toolkits/linux-rl9-gtk3 3.24.31 x11-toolkits emulation@freebsd.org
FreeBSD Ports x11-toolkits/linux-c7-gtk3 3.22.30 x11-toolkits emulation@freebsd.org
FreeBSD Ports x11-toolkits/gtk20 2.24.33 Potentially vulnerable x11-toolkits desktop@freebsd.org
FreeBSD Ports x11-toolkits/linux-rl9-gtk2 2.24.33 Potentially vulnerable x11-toolkits emulation@freebsd.org
FreeBSD Ports x11-toolkits/linux-c7-gtk2 2.24.31 Potentially vulnerable x11-toolkits emulation@freebsd.org
Gentoo gui-libs/gtk 4.18.6 gui-libs gnome@gentoo.org
Gentoo gui-libs/gtk 4.18.5 gui-libs gnome@gentoo.org
Gentoo gui-libs/gtk 4.16.13 gui-libs gnome@gentoo.org
Gentoo gui-libs/gtk 4.16.12 gui-libs gnome@gentoo.org
Gentoo gui-libs/gtk 4.14.4 gui-libs gnome@gentoo.org
Gentoo x11-libs/gtk+ 3.24.49 x11-libs gnome@gentoo.org
Gentoo x11-libs/gtk+ 3.24.49 x11-libs gnome@gentoo.org
Gentoo x11-libs/gtk+ 3.24.48 x11-libs gnome@gentoo.org
Gentoo x11-libs/gtk+ 3.24.42 x11-libs gnome@gentoo.org
Gentoo dev-util/gtk-update-icon-cache 3.24.42 dev-util gnome@gentoo.org
Gentoo dev-util/gtk-update-icon-cache 3.24.40 dev-util gnome@gentoo.org
Gentoo x11-libs/gtk+ 2.24.33 Potentially vulnerable x11-libs gnome@gentoo.org
GNU Guix gtk 4.16.13 - -
GNU Guix gtk+ 3.24.43 - -
GNU Guix gtk+ 2.24.33 Potentially vulnerable - -
GoboLinux GTK+ 3.24.43 - -
HaikuPorts master x11-libs/gtk3 3.24.36 x11-libs -
Homebrew gtk4 4.18.6 - -
Homebrew gtk+3 3.24.43 - -
Homebrew gtk+ 2.24.33 Potentially vulnerable - -
HP-UX 11.31
hppa_32
gtk+3 3.6.5 Potentially vulnerable - -
HP-UX 11.31
ia64_32
gtk+3 3.6.5 Potentially vulnerable - -
HP-UX 11.31
ia64_64
gtk+3 3.6.5 Potentially vulnerable - -
HP-UX 11.31
hppa_32
gtk+3 3.6.4 Potentially vulnerable - -
HP-UX 11.31
hppa_32
gtk+2 2.24.32 Potentially vulnerable - -
HP-UX 11.31
ia64_64
gtk+2 2.24.32 Potentially vulnerable - -
HP-UX 11.31
ia64_32
gtk+2 2.24.31 Potentially vulnerable - -
HP-UX 11.31
hppa_32
gtk+2 2.24.31 Potentially vulnerable - -
HP-UX 11.31
hppa_32
gtk+2 2.24.22 Potentially vulnerable - -
HP-UX 11.31
ia64_32
gtk+ 1.2.10 Potentially vulnerable - -
HP-UX 11.31
ia64_64
gtk+ 1.2.10 Potentially vulnerable - -
HP-UX 11.31
hppa_32
gtk+ 1.2.10 Potentially vulnerable - -
Kali Linux Rolling
main
gtk4 4.18.5 misc pkg-gnome-maintainers@lists.alioth.debian.org, bandali@ubuntu.com, jbicha@ubuntu.com, smcv@debian.org
Kali Linux Rolling
main
gtk+3.0 3.24.49 libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, mitya57@debian.org, smcv@debian.org
Kali Linux Rolling
main
gtk+2.0 2.24.33 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, pochu@debian.org
KaOS
main
gtk4 4.18.6 - demm@kaosx.us
KaOS
main
gtk3 3.24.49 - demm@kaosx.us
KaOS
main
gtk-update-icon-cache 3.24.49 - demm@kaosx.us
KISS Community - main
extra
gtk+3 3.24.49 - owen@owenrafferty.com
LiGurOS stable gui-libs/gtk 4.16.13 gui-libs gnome@gentoo.org
LiGurOS stable gui-libs/gtk 4.16.12 gui-libs gnome@gentoo.org
LiGurOS stable gui-libs/gtk 4.14.4 gui-libs gnome@gentoo.org
LiGurOS stable x11-libs/gtk+ 3.24.49 x11-libs gnome@gentoo.org
LiGurOS stable x11-libs/gtk+ 3.24.48 x11-libs gnome@gentoo.org
LiGurOS stable x11-libs/gtk+ 3.24.42 x11-libs gnome@gentoo.org
LiGurOS stable dev-util/gtk-update-icon-cache 3.24.42 dev-util gnome@gentoo.org
LiGurOS stable dev-util/gtk-update-icon-cache 3.24.40 dev-util gnome@gentoo.org
LiGurOS stable x11-libs/gtk+ 2.24.33 Potentially vulnerable x11-libs gnome@gentoo.org
LiGurOS develop gui-libs/gtk 4.18.6 gui-libs gnome@gentoo.org
LiGurOS develop gui-libs/gtk 4.18.5 gui-libs gnome@gentoo.org
LiGurOS develop gui-libs/gtk 4.16.13 gui-libs gnome@gentoo.org
LiGurOS develop gui-libs/gtk 4.16.12 gui-libs gnome@gentoo.org
LiGurOS develop gui-libs/gtk 4.14.4 gui-libs gnome@gentoo.org
LiGurOS develop x11-libs/gtk+ 3.24.49 x11-libs gnome@gentoo.org
LiGurOS develop x11-libs/gtk+ 3.24.49 x11-libs gnome@gentoo.org
LiGurOS develop x11-libs/gtk+ 3.24.48 x11-libs gnome@gentoo.org
LiGurOS develop dev-util/gtk-update-icon-cache 3.24.42 dev-util gnome@gentoo.org
LiGurOS develop x11-libs/gtk+ 3.24.42 x11-libs gnome@gentoo.org
LiGurOS develop dev-util/gtk-update-icon-cache 3.24.40 dev-util gnome@gentoo.org
LiGurOS develop x11-libs/gtk+ 2.24.33 Potentially vulnerable x11-libs gnome@gentoo.org
LMDE 5
upstream
gtk+3.0 3.14.5+4 libs pkg-gnome-maintainers@lists.alioth.debian.org, andreas@fatal.se, biebl@debian.org, mitya57@debian.org, pochu@debian.org
MacPorts gtk4 4.14.3 gnome mascguy@macports, mascguy@github
MacPorts gtk4-devel 4.14.3 gnome mascguy@macports, mascguy@github
MacPorts gtk3 3.24.49 gnome mascguy@macports, mascguy@github
MacPorts gtk3-devel 3.24.49 gnome mascguy@macports, mascguy@github
MacPorts gtk2 2.24.33 Potentially vulnerable gnome mascguy@macports, mascguy@github
MacPorts gtk2-devel 2.24.33 Potentially vulnerable gnome mascguy@macports, mascguy@github
Mageia 8
core/release
gtk4.0 4.1.0 System/Libraries -
Mageia 8
core/release
gtk+3.0 3.24.24 System/Libraries -
Mageia 8
core/release
mingw-gtk3 3.24.24 Development/Other -
Mageia 8
core/release
gtk+2.0 2.24.33 Potentially vulnerable System/Libraries -
Mageia 8
core/release
mingw-gtk2 2.24.32 Potentially vulnerable Development/Other -
Mageia 9
core/release
gtk4.0 4.10.3 System/Libraries -
Mageia 9
core/release
gtk+3.0 3.24.38 System/Libraries -
Mageia 9
core/updates
gtk+3.0 3.24.38 System/Libraries -
Mageia 9
core/updates
gtk+3.0 3.24.38 System/Libraries -
Mageia 9
core/release
mingw-gtk3 3.24.36 Development/Other -
Mageia 9
core/release
gtk+2.0 2.24.33 Potentially vulnerable System/Libraries -
Mageia 9
core/release
mingw-gtk2 2.24.33 Potentially vulnerable Development/Other -
Mageia 9
core/updates
gtk+2.0 2.24.33 Potentially vulnerable System/Libraries -
Mageia cauldron
core/release
gtk4.0 4.18.6 System/Libraries -
Mageia cauldron
core/release
gtk+3.0 3.24.49 System/Libraries -
Mageia cauldron
core/release
mingw-gtk3 3.24.49 Development/Other -
Mageia cauldron
core/release
gtk+2.0 2.24.33 Potentially vulnerable System/Libraries -
Mageia cauldron
core/release
mingw-gtk2 2.24.33 Potentially vulnerable Development/Other -
Manjaro Stable
extra
gtk4-demos 4.18.5 - -
Manjaro Stable
extra
gtk4 4.18.5 - -
Manjaro Stable
extra
gtk4-docs 4.18.5 - -
Manjaro Stable
extra
gtk-update-icon-cache 4.18.5 - -
Manjaro Stable
extra
gtk3-demos 3.24.49 - -
Manjaro Stable
extra
gtk3-docs 3.24.49 - -
Manjaro Stable
extra
gtk3 3.24.49 - -
Manjaro Stable
multilib
lib32-gtk3 3.24.49 - -
Manjaro Stable
extra
gtk2 2.24.33 Potentially vulnerable - -
Manjaro Stable
multilib
lib32-gtk2 2.24.33 Potentially vulnerable - -
Manjaro Testing
extra
gtk4-docs 4.18.6 - -
Manjaro Testing
extra
gtk4 4.18.6 - -
Manjaro Testing
extra
gtk4-demos 4.18.6 - -
Manjaro Testing
extra
gtk-update-icon-cache 4.18.6 - -
Manjaro Testing
extra
gtk3-demos 3.24.49 - -
Manjaro Testing
extra
gtk3 3.24.49 - -
Manjaro Testing
extra
gtk3-docs 3.24.49 - -
Manjaro Testing
multilib
lib32-gtk3 3.24.49 - -
Manjaro Testing
multilib
lib32-gtk2 2.24.33 Potentially vulnerable - -
Manjaro Testing
extra
gtk2 2.24.33 Potentially vulnerable - -
Manjaro Unstable
extra
gtk4-demos 4.18.6 - -
Manjaro Unstable
extra
gtk4 4.18.6 - -
Manjaro Unstable
extra
gtk-update-icon-cache 4.18.6 - -
Manjaro Unstable
extra
gtk4-docs 4.18.6 - -
Manjaro Unstable
extra
gtk3-docs 3.24.49 - -
Manjaro Unstable
extra
gtk3 3.24.49 - -
Manjaro Unstable
multilib
lib32-gtk3 3.24.49 - -
Manjaro Unstable
extra
gtk3-demos 3.24.49 - -
Manjaro Unstable
extra
gtk2 2.24.33 Potentially vulnerable - -
Manjaro Unstable
multilib
lib32-gtk2 2.24.33 Potentially vulnerable - -
MidnightBSD mports x11-toolkits/gtk40 4.12.5 x11-toolkits -
MidnightBSD mports x11-toolkits/gtk30 3.24.43 x11-toolkits -
MidnightBSD mports graphics/gtk-update-icon-cache 3.24.31 graphics -
MidnightBSD mports x11-toolkits/linux-rl9-gtk3 3.24.31 x11-toolkits -
MidnightBSD mports x11-toolkits/linux-c7-gtk3 3.22.30 x11-toolkits -
MidnightBSD mports x11-toolkits/gtk20 2.24.33 Potentially vulnerable x11-toolkits -
MidnightBSD mports x11-toolkits/linux-rl9-gtk2 2.24.33 Potentially vulnerable x11-toolkits -
MidnightBSD mports x11-toolkits/linux-c7-gtk2 2.24.31 Potentially vulnerable x11-toolkits -
MSYS2 clang64 mingw-w64-clang-x86_64-gtk4 4.18.6 - -
MSYS2 clang64 mingw-w64-clang-x86_64-gtk4-media-gstreamer 4.18.6 - -
MSYS2 clang64 mingw-w64-clang-x86_64-gtk-update-icon-cache 3.24.49 - -
MSYS2 clang64 mingw-w64-clang-x86_64-gtk3 3.24.49 - -
MSYS2 clang64 mingw-w64-clang-x86_64-gtk2 2.24.33 Potentially vulnerable - -
MSYS2 clangarm64 mingw-w64-clang-aarch64-gtk4 4.18.6 - -
MSYS2 clangarm64 mingw-w64-clang-aarch64-gtk4-media-gstreamer 4.18.6 - -
MSYS2 clangarm64 mingw-w64-clang-aarch64-gtk3 3.24.49 - -
MSYS2 clangarm64 mingw-w64-clang-aarch64-gtk-update-icon-cache 3.24.49 - -
MSYS2 clangarm64 mingw-w64-clang-aarch64-gtk2 2.24.33 Potentially vulnerable - -
MSYS2 mingw
x86_64
mingw-w64-x86_64-gtk4 4.18.6 - -
MSYS2 mingw
x86_64
mingw-w64-x86_64-gtk4-media-gstreamer 4.18.6 - -
MSYS2 mingw
x86_64
mingw-w64-x86_64-gtk3 3.24.49 - -
MSYS2 mingw
x86_64
mingw-w64-x86_64-gtk-update-icon-cache 3.24.49 - -
MSYS2 mingw
i686
mingw-w64-i686-gtk3 3.24.49 - -
MSYS2 mingw
i686
mingw-w64-i686-gtk-update-icon-cache 3.24.49 - -
MSYS2 mingw
x86_64
mingw-w64-x86_64-gtk2 2.24.33 Potentially vulnerable - -
MSYS2 ucrt64 mingw-w64-ucrt-x86_64-gtk4 4.18.6 - -
MSYS2 ucrt64 mingw-w64-ucrt-x86_64-gtk4-media-gstreamer 4.18.6 - -
MSYS2 ucrt64 mingw-w64-ucrt-x86_64-gtk-update-icon-cache 3.24.49 - -
MSYS2 ucrt64 mingw-w64-ucrt-x86_64-gtk3 3.24.49 - -
MSYS2 ucrt64 mingw-w64-ucrt-x86_64-gtk2 2.24.33 Potentially vulnerable - -
MX Linux MX-19
main
gtk+3.0 3.24.5 libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org
MX Linux MX-19 Testing gtk+3.0 3.24.5 libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org
nixpkgs stable 22.11 gtk4 4.8.2 - torhedinbronner@gmail.com, daniel@serbanescu.dk, maxeaubrey@gmail.com, rjl931189261@126.com, 7c6f434c@mail.ru
nixpkgs stable 22.11 gtk+3 3.24.35 - torhedinbronner@gmail.com, daniel@serbanescu.dk, maxeaubrey@gmail.com, 7c6f434c@mail.ru, rjl931189261@126.com
nixpkgs stable 22.11 gtk+3 3.24.35 - torhedinbronner@gmail.com, daniel@serbanescu.dk, maxeaubrey@gmail.com, 7c6f434c@mail.ru, rjl931189261@126.com
nixpkgs stable 22.11 gtk+ 2.24.33 Potentially vulnerable - jason@oconal.id.au, 7c6f434c@mail.ru
nixpkgs stable 22.11 gtk+ 2.24.33 Potentially vulnerable - jason@oconal.id.au, 7c6f434c@mail.ru
nixpkgs stable 23.05 gtk4 4.10.3 - torhedinbronner@gmail.com, daniel@serbanescu.dk, maxeaubrey@gmail.com, rjl931189261@126.com, 7c6f434c@mail.ru
nixpkgs stable 23.05 gtk+3 3.24.37 - torhedinbronner@gmail.com, daniel@serbanescu.dk, maxeaubrey@gmail.com, 7c6f434c@mail.ru, rjl931189261@126.com
nixpkgs stable 23.05 gtk+3 3.24.37 - torhedinbronner@gmail.com, daniel@serbanescu.dk, maxeaubrey@gmail.com, 7c6f434c@mail.ru, rjl931189261@126.com
nixpkgs stable 23.05 gtk+ 2.24.33 Potentially vulnerable - jason@oconal.id.au, 7c6f434c@mail.ru
nixpkgs stable 23.05 gtk+ 2.24.33 Potentially vulnerable - jason@oconal.id.au, 7c6f434c@mail.ru
nixpkgs stable 23.11 gtk4 4.12.5 - max@ine.dev, torhedinbronner@gmail.com, daniel@serbanescu.dk, rjl931189261@126.com, 7c6f434c@mail.ru
nixpkgs stable 23.11 gtk+3 3.24.41 - max@ine.dev, torhedinbronner@gmail.com, daniel@serbanescu.dk, 7c6f434c@mail.ru, rjl931189261@126.com
nixpkgs stable 23.11 gtk+3 3.24.41 - max@ine.dev, torhedinbronner@gmail.com, daniel@serbanescu.dk, 7c6f434c@mail.ru, rjl931189261@126.com
nixpkgs stable 23.11 gtk+ 2.24.33 Potentially vulnerable - jason@oconal.id.au, 7c6f434c@mail.ru
nixpkgs stable 23.11 gtk+ 2.24.33 Potentially vulnerable - jason@oconal.id.au, 7c6f434c@mail.ru
nixpkgs stable 24.05 gtk4 4.14.4 - torhedinbronner@gmail.com, daniel@serbanescu.dk, jtojnar@gmail.com, rjl931189261@126.com, 7c6f434c@mail.ru
nixpkgs stable 24.05 gtk+3 3.24.43 - torhedinbronner@gmail.com, daniel@serbanescu.dk, jtojnar@gmail.com, 7c6f434c@mail.ru, rjl931189261@126.com
nixpkgs stable 24.05 gtk+3 3.24.43 - torhedinbronner@gmail.com, daniel@serbanescu.dk, jtojnar@gmail.com, 7c6f434c@mail.ru, rjl931189261@126.com
nixpkgs stable 24.05 gtk+ 2.24.33 Potentially vulnerable - jason@oconal.id.au, 7c6f434c@mail.ru
nixpkgs stable 24.05 gtk+ 2.24.33 Potentially vulnerable - jason@oconal.id.au, 7c6f434c@mail.ru
nixpkgs stable 24.11 gtk4 4.16.12 - torhedinbronner@gmail.com, daniel@serbanescu.dk, jtojnar@gmail.com, rjl931189261@126.com, 7c6f434c@mail.ru
nixpkgs stable 24.11 gtk+3 3.24.43 - torhedinbronner@gmail.com, daniel@serbanescu.dk, jtojnar@gmail.com, 7c6f434c@mail.ru, rjl931189261@126.com
nixpkgs stable 24.11 gtk+3 3.24.43 - torhedinbronner@gmail.com, daniel@serbanescu.dk, jtojnar@gmail.com, 7c6f434c@mail.ru, rjl931189261@126.com
nixpkgs stable 24.11 gtk+ 2.24.33 Potentially vulnerable - jason@oconal.id.au, 7c6f434c@mail.ru
nixpkgs stable 24.11 gtk+ 2.24.33 Potentially vulnerable - jason@oconal.id.au, 7c6f434c@mail.ru
nixpkgs stable 25.05 gtk4 4.18.5 - 7c6f434c@mail.ru
nixpkgs stable 25.05 gtk+3 3.24.49 - 7c6f434c@mail.ru
nixpkgs stable 25.05 gtk+3 3.24.49 - 7c6f434c@mail.ru
nixpkgs stable 25.05 gtk+ 2.24.33 Potentially vulnerable - jason@oconal.id.au, 7c6f434c@mail.ru
nixpkgs stable 25.05 gtk+ 2.24.33 Potentially vulnerable - jason@oconal.id.au, 7c6f434c@mail.ru
nixpkgs unstable gtk4 4.18.5 - 7c6f434c@mail.ru
nixpkgs unstable gtk+3 3.24.49 - 7c6f434c@mail.ru
nixpkgs unstable gtk+3 3.24.49 - 7c6f434c@mail.ru
nixpkgs unstable gtk+ 2.24.33 Potentially vulnerable - jason@oconal.id.au, 7c6f434c@mail.ru
nixpkgs unstable gtk+ 2.24.33 Potentially vulnerable - jason@oconal.id.au, 7c6f434c@mail.ru
NOIR Linux Main
extra
gtk+4 4.12.5 - mmatongo_@hotmail.com
NOIR Linux Main
extra
gtk+3 3.24.36 - mmatongo_@hotmail.com
OpenBSD Ports x11/gtk+4 4.18.6 x11 ajacoutot@openbsd.org
OpenBSD Ports x11/gtk+4 4.18.6 x11 ajacoutot@openbsd.org
OpenBSD Ports x11/gtk+4 4.18.6 x11 ajacoutot@openbsd.org
OpenBSD Ports x11/gtk+4 4.18.6 x11 ajacoutot@openbsd.org
OpenBSD Ports x11/gtk+4 4.18.6 x11 ajacoutot@openbsd.org
OpenBSD Ports x11/gtk+3 3.24.49 x11 ajacoutot@openbsd.org
OpenBSD Ports x11/gtk+3 3.24.49 x11 ajacoutot@openbsd.org
OpenBSD Ports x11/gtk+3 3.24.49 x11 ajacoutot@openbsd.org
OpenBSD Ports x11/gtk+2 2.24.33 Potentially vulnerable x11 ajacoutot@openbsd.org
OpenBSD Ports x11/gtk+2 2.24.33 Potentially vulnerable x11 ajacoutot@openbsd.org
OpenBSD Ports x11/gtk+2 2.24.33 Potentially vulnerable x11 ajacoutot@openbsd.org
openEuler 20.03-LTS-SP3 gtk3 3.24.21 Unspecified -
openEuler 20.03-LTS-SP3 gtk2 2.24.32 Potentially vulnerable Unspecified -
openEuler 20.03-LTS-SP3 gtk+ 1.2.10 Potentially vulnerable Unspecified -
openEuler 20.03-LTS-SP4 gtk3 3.24.21 Unspecified -
openEuler 20.03-LTS-SP4 gtk2 2.24.32 Potentially vulnerable Unspecified -
openEuler 20.03-LTS-SP4 gtk+ 1.2.10 Potentially vulnerable Unspecified -
openEuler 22.03-LTS gtk3 3.24.30 Unspecified -
openEuler 22.03-LTS gtk2 2.24.33 Potentially vulnerable Unspecified -
openEuler 22.03-LTS gtk+ 1.2.10 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP1 gtk4 4.7.0 Unspecified -
openEuler 22.03-LTS-SP1 gtk3 3.24.30 Unspecified -
openEuler 22.03-LTS-SP1 gtk2 2.24.33 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP1 gtk+ 1.2.10 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP2 gtk4 4.7.0 Unspecified -
openEuler 22.03-LTS-SP2 gtk3 3.24.30 Unspecified -
openEuler 22.03-LTS-SP2 gtk2 2.24.33 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP2 gtk+ 1.2.10 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP3 gtk4 4.7.0 Unspecified -
openEuler 22.03-LTS-SP3 gtk3 3.24.30 Unspecified -
openEuler 22.03-LTS-SP3 gtk2 2.24.33 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP3 gtk+ 1.2.10 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP4 gtk4 4.7.0 Unspecified -
openEuler 22.03-LTS-SP4 gtk3 3.24.30 Unspecified -
openEuler 22.03-LTS-SP4 gtk2 2.24.33 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP4 gtk+ 1.2.10 Potentially vulnerable Unspecified -
openEuler 23.03 gtk4 4.9.1 Unspecified -
openEuler 23.03 gtk3 3.24.36 Unspecified -
openEuler 23.03 gtk2 2.24.33 Potentially vulnerable Unspecified -
openEuler 23.03 gtk+ 1.2.10 Potentially vulnerable Unspecified -
openEuler 23.09 gtk4 4.9.1 Unspecified -
openEuler 23.09 gtk3 3.24.38 Unspecified -
openEuler 23.09 gtk2 2.24.33 Potentially vulnerable Unspecified -
openEuler 23.09 gtk+ 1.2.10 Potentially vulnerable Unspecified -
openEuler 24.03-LTS gtk4 4.10.5 Unspecified -
openEuler 24.03-LTS gtk3 3.24.41 Unspecified -
openEuler 24.03-LTS gtk2 2.24.33 Potentially vulnerable Unspecified -
openEuler 24.03-LTS gtk+ 1.2.10 Potentially vulnerable Unspecified -
openEuler 24.03-LTS-SP1 gtk4 4.10.5 Unspecified -
openEuler 24.03-LTS-SP1 gtk3 3.24.41 Unspecified -
openEuler 24.03-LTS-SP1 gtk2 2.24.33 Potentially vulnerable Unspecified -
openEuler 24.03-LTS-SP1 gtk+ 1.2.10 Potentially vulnerable Unspecified -
openEuler 24.09 gtk4 4.10.5 Unspecified -
openEuler 24.09 gtk3 3.24.41 Unspecified -
openEuler 24.09 gtk2 2.24.33 Potentially vulnerable Unspecified -
openEuler 24.09 gtk+ 1.2.10 Potentially vulnerable Unspecified -
openEuler 25.03 gtk4 4.10.5 Unspecified -
openEuler 25.03 gtk3 3.24.48 Unspecified -
openEuler 25.03 gtk2 2.24.33 Potentially vulnerable Unspecified -
openEuler 25.03 gtk+ 1.2.10 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
gtk 4.16.13 Desktop (GNOME)/Libraries -
OpenIndiana packages
hipster
gtk 3.24.49 Desktop (GNOME)/Libraries -
OpenIndiana packages
hipster
gtk+ 2.24.33 Potentially vulnerable Desktop (GNOME)/Libraries -
OpenIndiana packages
hipster
gtk+ 2.24.33 Potentially vulnerable Desktop (GNOME)/Libraries -
openmamba
base
libgtk 4.18.6 System/Libraries silvan.calarco@mambasoft.it
openmamba
base
libgtk3 3.24.43 System/Libraries silvan.calarco@mambasoft.it
openmamba
base
libgtk2 2.24.33 Potentially vulnerable System/Libraries silvan.calarco@mambasoft.it
OpenMandriva 4.3
main/updates
gtk4.0 4.6.1 System/Libraries angrypenguinpoland@gmail.com
OpenMandriva 4.3
main/release
gtk4.0 4.6.0 System/Libraries bero@lindev.ch
OpenMandriva 4.3
main/release
gtk+3.0 3.24.31 System/Libraries angrypenguinpoland@gmail.com
OpenMandriva 4.3
main/release
gtk+2.0 2.24.33 Potentially vulnerable System/Libraries bero@lindev.ch
OpenMandriva 5.0
main/release
gtk4.0 4.12.4 System/Libraries angrypenguinpoland@gmail.com
OpenMandriva 5.0
main/release
gtk+3.0 3.24.38 System/Libraries angrypenguinpoland@gmail.com
OpenMandriva 5.0
main/release
gtk+2.0 2.24.33 Potentially vulnerable System/Libraries bero@lindev.ch
OpenMandriva 6.0
main/updates
gtk4.0 4.18.5 System/Libraries angrypenguinpoland@gmail.com
OpenMandriva 6.0
main/release
gtk4.0 4.18.4 System/Libraries angrypenguinpoland@gmail.com
OpenMandriva 6.0
main/release
gtk+3.0 3.24.49 System/Libraries angrypenguinpoland@gmail.com
OpenMandriva 6.0
main/release
gtk+2.0 2.24.33 Potentially vulnerable System/Libraries -
OpenMandriva Rolling
main/release
gtk4.0 4.18.5 System/Libraries angrypenguinpoland@gmail.com
OpenMandriva Rolling
main/release
gtk4.0 4.18.4 System/Libraries angrypenguinpoland@gmail.com
OpenMandriva Rolling
main/release
gtk+3.0 3.24.49 System/Libraries angrypenguinpoland@gmail.com
OpenMandriva Rolling
main/release
gtk+2.0 2.24.33 Potentially vulnerable System/Libraries -
OpenMandriva Cooker
main/release
gtk4.0 4.18.6 System/Libraries angrypenguinpoland@gmail.com
OpenMandriva Cooker
main/release
gtk+3.0 3.24.49 System/Libraries angrypenguinpoland@gmail.com
OpenMandriva Cooker
main/release
gtk+2.0 2.24.33 Potentially vulnerable System/Libraries -
openSUSE Leap 15.4
updates/sle
gtk4 4.6.9 Development/Libraries/X11 -
openSUSE Leap 15.4
main/oss
gtk4 4.6.0 Development/Libraries/X11 -
openSUSE Leap 15.4
updates/sle
gtk4 4.6.0 Development/Libraries/X11 -
openSUSE Leap 15.4
updates/sle
gtk3 3.24.34 Development/Libraries/X11 -
openSUSE Leap 15.4
updates/sle
gtk3 3.24.34 Development/Libraries/X11 -
openSUSE Leap 15.4
main/oss
gtk3 3.24.31 Development/Libraries/X11 -
openSUSE Leap 15.4
main/oss
gtk2 2.24.33 Potentially vulnerable System/Libraries -
openSUSE Leap 15.5
updates/sle
gtk4 4.6.9 Development/Libraries/X11 -
openSUSE Leap 15.5
main/oss
gtk4 4.6.0 Development/Libraries/X11 -
openSUSE Leap 15.5
main/oss
gtk3 3.24.34 Development/Libraries/X11 -
openSUSE Leap 15.5
updates/sle
gtk3 3.24.34 Development/Libraries/X11 -
openSUSE Leap 15.5
updates/sle
gtk3 3.24.34 Development/Libraries/X11 -
openSUSE Leap 15.5
main/oss
gtk2 2.24.33 Potentially vulnerable System/Libraries -
openSUSE Leap 15.5
updates/sle
gtk2 2.24.33 Potentially vulnerable System/Libraries -
openSUSE Leap 15.6
main/oss
gtk4 4.12.4 Development/Libraries/X11 -
openSUSE Leap 15.6
updates/sle
gtk4 4.12.4 Development/Libraries/X11 -
openSUSE Leap 15.6
updates/sle
gtk4 4.12.4 Development/Libraries/X11 -
openSUSE Leap 15.6
updates/sle
gtk3 3.24.43 Development/Libraries/X11 -
openSUSE Leap 15.6
main/oss
gtk3 3.24.38 Development/Libraries/X11 -
openSUSE Leap 15.6
updates/sle
gtk3 3.24.38 Development/Libraries/X11 -
openSUSE Leap 15.6
main/oss
gtk2 2.24.33 Potentially vulnerable System/Libraries -
openSUSE Leap 15.6
updates/sle
gtk2 2.24.33 Potentially vulnerable System/Libraries -
openSUSE Tumbleweed
src-oss
gtk4 4.18.6 Development/Libraries/X11 -
openSUSE Tumbleweed
src-oss
gtk3 3.24.49 Development/Libraries/X11 -
openSUSE Tumbleweed
src-oss
gtk2 2.24.33 Potentially vulnerable System/Libraries -
Parabola
extra
gtk4-docs 4.18.6 - -
Parabola
extra
gtk4 4.18.6 - -
Parabola
extra
gtk-update-icon-cache 4.18.6 - -
Parabola
extra
gtk4-demos 4.18.6 - -
Parabola
extra
gtk3-demos 3.24.49 - -
Parabola
extra
gtk3 3.24.49 - -
Parabola
extra
gtk3-docs 3.24.49 - -
Parabola
extra
gtk2 2.24.33 Potentially vulnerable - -
Pardus 21
main
gtk+3.0 3.24.24 libs pkg-gnome-maintainers@lists.alioth.debian.org, smcv@debian.org
Pardus 21
main
gtk+2.0 2.24.33 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, pochu@debian.org
Parrot
parrot/main
gtk4 4.8.3 misc pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, smcv@debian.org
Parrot
parrot-updates/main
gtk4 4.8.3 misc pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, smcv@debian.org
Parrot
parrot/main
gtk+3.0 3.24.38 libs pkg-gnome-maintainers@lists.alioth.debian.org, mitya57@debian.org, smcv@debian.org
Parrot
parrot-updates/main
gtk+3.0 3.24.38 libs pkg-gnome-maintainers@lists.alioth.debian.org, mitya57@debian.org, smcv@debian.org
Parrot
parrot/main
gtk+2.0 2.24.33 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, pochu@debian.org
Parrot
parrot-updates/main
gtk+2.0 2.24.33 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, pochu@debian.org
PCLinuxOS gtk+4.0 4.18.6 System/Libraries -
PCLinuxOS gtk+3.0 3.24.48 System/Libraries -
PCLinuxOS gtk+2.0 2.24.33 Potentially vulnerable System/Libraries -
PCLinuxOS gtk+ 1.2.10 Potentially vulnerable System/Libraries -
Pisi Linux
main
gtk4 4.18.6 - admins@pisilinux.org
Pisi Linux
main
gtk3 3.24.48 - admins@pisilinux.org
Pisi Linux
main
gtk2 2.24.33 Potentially vulnerable gtk2 admins@pisilinux.org
pkgsrc current x11/gtk4 4.16.13 x11 ryoon@netbsd.org
pkgsrc current x11/gtk3 3.24.43 x11 pkgsrc-users@netbsd.org
pkgsrc current x11/gtk2 2.24.33 Potentially vulnerable x11 pkgsrc-users@netbsd.org
pkgsrc current x11/gtk 1.2.10 Potentially vulnerable x11 pkgsrc-users@netbsd.org
PLD Linux gtk4 4.18.5 - -
PLD Linux gtk+3 3.24.49 - -
PLD Linux crossmingw32-gtk+2 2.24.33 Potentially vulnerable - -
PLD Linux gtk+2 2.24.33 Potentially vulnerable - -
PLD Linux gtk+ 1.2.10 Potentially vulnerable - -
postmarketOS 22.12
aarch64
gtk+3.0 9999_git20210602 - fallback-mnt-postmarketos@repology
postmarketOS 22.12
aarch64
gtk+3.0-demo 9999_git20210602 - fallback-mnt-postmarketos@repology
postmarketOS 22.12
aarch64
gtk+3.0-dev 9999_git20210602 - fallback-mnt-postmarketos@repology
postmarketOS 22.12
aarch64
gtk+3.0-lang 9999_git20210602 - fallback-mnt-postmarketos@repology
postmarketOS 22.12
aarch64
gtk+3.0-dbg 9999_git20210602 - fallback-mnt-postmarketos@repology
postmarketOS 23.06
aarch64
gtk+3.0-demo 9999_git20230719 - fallback-mnt-postmarketos@repology
postmarketOS 23.06
aarch64
gtk+3.0-dev 9999_git20230719 - fallback-mnt-postmarketos@repology
postmarketOS 23.06
aarch64
gtk+3.0-dbg 9999_git20230719 - fallback-mnt-postmarketos@repology
postmarketOS 23.06
aarch64
gtk+3.0 9999_git20230719 - fallback-mnt-postmarketos@repology
postmarketOS 23.06
aarch64
gtk+3.0-lang 9999_git20230719 - fallback-mnt-postmarketos@repology
postmarketOS 23.12
aarch64
gtk4.0-lang 9999.4.12.4 - tpikonen@mailbox.org
postmarketOS 23.12
aarch64
gtk4.0-doc 9999.4.12.4 - tpikonen@mailbox.org
postmarketOS 23.12
aarch64
gtk4.0-demo 9999.4.12.4 - tpikonen@mailbox.org
postmarketOS 23.12
aarch64
gtk4.0-dev 9999.4.12.4 - tpikonen@mailbox.org
postmarketOS 23.12
aarch64
gtk4.0-dbg 9999.4.12.4 - tpikonen@mailbox.org
postmarketOS 23.12
aarch64
gtk4.0 9999.4.12.4 - tpikonen@mailbox.org
postmarketOS 23.12
aarch64
gtk+3.0 9999_git20230719 - fallback-mnt-postmarketos@repology
postmarketOS 23.12
aarch64
gtk+3.0-lang 9999_git20230719 - fallback-mnt-postmarketos@repology
postmarketOS 23.12
aarch64
gtk+3.0-dev 9999_git20230719 - fallback-mnt-postmarketos@repology
postmarketOS 23.12
aarch64
gtk+3.0-demo 9999_git20230719 - fallback-mnt-postmarketos@repology
postmarketOS 23.12
aarch64
gtk+3.0-dbg 9999_git20230719 - fallback-mnt-postmarketos@repology
postmarketOS 24.06
aarch64
gtk4.0-demo 9999.4.14.4 - tpikonen@mailbox.org
postmarketOS 24.06
aarch64
gtk4.0 9999.4.14.4 - tpikonen@mailbox.org
postmarketOS 24.06
aarch64
gtk4.0-doc 9999.4.14.4 - tpikonen@mailbox.org
postmarketOS 24.06
aarch64
gtk4.0-dbg 9999.4.14.4 - tpikonen@mailbox.org
postmarketOS 24.06
aarch64
gtk4.0-dev 9999.4.14.4 - tpikonen@mailbox.org
postmarketOS 24.06
aarch64
gtk4.0-lang 9999.4.14.4 - tpikonen@mailbox.org
postmarketOS 24.06
aarch64
gtk+3.0-dev 9999_git20231113 - fallback-mnt-postmarketos@repology
postmarketOS 24.06
aarch64
gtk+3.0-demo 9999_git20231113 - fallback-mnt-postmarketos@repology
postmarketOS 24.06
aarch64
gtk+3.0 9999_git20231113 - fallback-mnt-postmarketos@repology
postmarketOS 24.06
aarch64
gtk+3.0-dbg 9999_git20231113 - fallback-mnt-postmarketos@repology
postmarketOS 24.06
aarch64
gtk+3.0-lang 9999_git20231113 - fallback-mnt-postmarketos@repology
PTXdist gtk 3.24.48 - -
PureOS amber
amber/main
gtk+3.0 3.24.5 introspection pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, laney@debian.org
PureOS amber
amber/main
gtk+2.0 2.24.32 Potentially vulnerable introspection pkg-gnome-maintainers@lists.alioth.debian.org, biebl@debian.org, jbicha@debian.org, pochu@debian.org
PureOS byzantium
byzantium/main
gtk4 4.6.5 introspection pkg-gnome-maintainers@lists.alioth.debian.org, smcv@debian.org
PureOS byzantium
byzantium/main
gtk+3.0 3.24.27 introspection pkg-gnome-maintainers@lists.alioth.debian.org, smcv@debian.org
PureOS byzantium
byzantium/main
gtk+2.0 2.24.33 Potentially vulnerable introspection pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, pochu@debian.org
PureOS landing
landing/main
gtk4 4.18.5 introspection pkg-gnome-maintainers@lists.alioth.debian.org, bandali@ubuntu.com, jbicha@ubuntu.com, smcv@debian.org
PureOS landing
landing/main
gtk+3.0 3.24.49 introspection pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, mitya57@debian.org, smcv@debian.org
PureOS landing
landing/main
gtk+2.0 2.24.33 Potentially vulnerable oldlibs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, pochu@debian.org
Raspbian Oldstable
main
gtk+3.0 3.24.24 libs pkg-gnome-maintainers@lists.alioth.debian.org, smcv@debian.org
Raspbian Oldstable
main
gtk+2.0 2.24.33 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, pochu@debian.org
Raspbian Stable
main
gtk4 4.8.3 libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, smcv@debian.org
Raspbian Stable
main
gtk+3.0 3.24.38 libs pkg-gnome-maintainers@lists.alioth.debian.org, mitya57@debian.org, smcv@debian.org
Raspbian Stable
main
gtk+2.0 2.24.33 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@debian.org, pochu@debian.org
Raspbian Testing
main
gtk4 4.18.5 misc pkg-gnome-maintainers@lists.alioth.debian.org, bandali@ubuntu.com, jbicha@ubuntu.com, smcv@debian.org
Raspbian Testing
main
gtk+3.0 3.24.49 libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, mitya57@debian.org, smcv@debian.org
Raspbian Testing
main
gtk+2.0 2.24.33 Potentially vulnerable libs pkg-gnome-maintainers@lists.alioth.debian.org, jbicha@ubuntu.com, pochu@debian.org
Ravenports gtk4 4.18.6 x11_toolkits fallback-mnt-ravenports@repology
Ravenports gtk3 3.24.49 x11_toolkits fallback-mnt-ravenports@repology
Ravenports gtk2 2.24.33 Potentially vulnerable x11_toolkits fallback-mnt-ravenports@repology
Rocky Linux 8
AppStream
gtk3 3.22.30 Unspecified infrastructure@rockylinux.org
Rocky Linux 8
AppStream
gtk3 3.22.30 Unspecified infrastructure@rockylinux.org
Rocky Linux 8
AppStream
gtk2 2.24.32 Potentially vulnerable System Environment/Libraries infrastructure@rockylinux.org
Rocky Linux 9
AppStream
gtk4 4.12.3 Unspecified releng@rockylinux.org
Rocky Linux 9
AppStream
gtk3 3.24.31 Unspecified releng@rockylinux.org
Rocky Linux 9
CRB
gtk3 3.24.31 Unspecified releng@rockylinux.org
Rocky Linux 9
AppStream
gtk2 2.24.33 Potentially vulnerable Unspecified releng@rockylinux.org
Rosa 2021.1
main/release
gtk4 4.7.2 System/Libraries survolog@yandex.ru
Rosa 2021.1
main/release
gtk+3.0 3.24.43 System/Libraries survolog@yandex.ru
Rosa 2021.1
main/release
gtk+2.0 2.24.33 Potentially vulnerable System/Libraries alexander@mezon.ru
Rosa 2021.1
contrib/release
gtk+ 1.2.10 Potentially vulnerable System/Libraries m.novosyolov@rosalinux.ru
Rosa 13
main/release
gtk4 4.18.4 System/Libraries survolog@yandex.ru
Rosa 13
main/release
gtk+3.0 3.24.49 System/Libraries survolog@yandex.ru
Rosa 13
main/release
gtk+2.0 2.24.33 Potentially vulnerable System/Libraries alexander@mezon.ru
Rosa Server 6.9
base/release
gtk2 2.24.23 Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
gtk2 2.24.23 Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
gtk2 2.24.23 Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 6.9
extra/release
gtk+ 1.2.10 Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
gtk3 3.14.13 System Environment/Libraries alex2048@mail.ru
Rosa Server 7.3
base/release
gtk2 2.24.28 Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Rosa Server 7.3
extra/release
gtk+ 1.2.10 Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Rosa Server 7.5
base/release
gtk3 3.22.26 Unspecified alex2048@mail.ru
Rosa Server 7.5
base/release
gtk3 3.14.13 System Environment/Libraries alex2048@mail.ru
Rosa Server 7.5
base/release
gtk2 2.24.31 Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Rosa Server 7.5
base/release
gtk2 2.24.28 Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Rosa Server 7.5
extra/release
gtk+ 1.2.10 Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Scientific Linux 7.x gtk3 3.22.30 Unspecified -
Scientific Linux 7.x gtk3 3.22.30 Unspecified -
Scientific Linux 7.x gtk3 3.22.30 Unspecified -
Scientific Linux 7.x gtk3 3.22.30 Unspecified -
Scientific Linux 7.x gtk3 3.22.26 Unspecified -
Scientific Linux 7.x gtk3 3.22.26 Unspecified -
Scientific Linux 7.x gtk3 3.22.10 Unspecified -
Scientific Linux 7.x gtk3 3.22.10 Unspecified -
Scientific Linux 7.x gtk3 3.14.13 System Environment/Libraries -
Scientific Linux 7.x gtk3 3.14.13 System Environment/Libraries -
Scientific Linux 7.x gtk3 3.14.13 System Environment/Libraries -
Scientific Linux 7.x gtk3 3.8.8 Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x gtk3 3.8.8 Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x gtk3 3.8.4 Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x gtk2 2.24.31 Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x gtk2 2.24.28 Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x gtk2 2.24.22 Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x gtk2 2.24.22 Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x gtk2 2.24.22 Potentially vulnerable System Environment/Libraries -
Side Linux gtk3 3.24.43 - uglyside@yandex.ru
Side Linux gtk2 2.24.33 Potentially vulnerable - uglyside@yandex.ru
Slackware 14.2
slackware
gtk+3 3.18.9 - volkerdi@slackware.com
Slackware 14.2
patches
gtk+2 2.24.31 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
gtk+2 2.24.30 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
gtk+ 1.2.10 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
gtk4 4.4.1 - volkerdi@slackware.com
Slackware 15.0
slackware
gtk+3 3.24.31 - volkerdi@slackware.com
Slackware 15.0
slackware
gtk+2 2.24.33 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
gtk+ 1.2.10 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
gtk4 4.18.6 - volkerdi@slackware.com
Slackware current
slackware
gtk+3 3.24.49 - volkerdi@slackware.com
Slackware current
slackware
gtk+2 2.24.33 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
gtk+ 1.2.10 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
gtk+3 3.18.9 - volkerdi@slackware.com
Slackware64 14.2
patches
gtk+2 2.24.31 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
gtk+2 2.24.30 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
gtk+ 1.2.10 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
gtk4 4.4.1 - volkerdi@slackware.com
Slackware64 15.0
slackware64
gtk+3 3.24.31 - volkerdi@slackware.com
Slackware64 15.0
slackware64
gtk+2 2.24.33 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
gtk+ 1.2.10 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
gtk4 4.18.6 - volkerdi@slackware.com
Slackware64 current
slackware64
gtk+3 3.24.49 - volkerdi@slackware.com
Slackware64 current
slackware64
gtk+2 2.24.33 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
gtk+ 1.2.10 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
gtk+3 3.18.9 - volkerdi@slackware.com
Slackwarearm 14.2
patches
gtk+2 2.24.31 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
gtk+2 2.24.30 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
gtk+ 1.2.10 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
gtk4 4.4.1 - volkerdi@slackware.com
Slackwarearm 15.0
slackware
gtk+3 3.24.31 - volkerdi@slackware.com
Slackwarearm 15.0
slackware
gtk+2 2.24.33 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
gtk+ 1.2.10 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking gtk+3 3.14.8 x-window pankso@slitaz.org
SliTaz Cooking gtk+3-demo 3.14.8 development pankso@slitaz.org
SliTaz Cooking gtk+3-dev 3.14.8 development pankso@slitaz.org
SliTaz Cooking gtk+3-widget-factory 3.14.8 development pankso@slitaz.org
SliTaz Cooking gtk+ 2.24.32 Potentially vulnerable x-window pankso@slitaz.org
SliTaz Cooking gtk+-demo 2.24.32 Potentially vulnerable development pankso@slitaz.org
SliTaz Cooking gtk+-dev 2.24.32 Potentially vulnerable development pankso@slitaz.org
SliTaz Cooking gtk-girepository 2.24.32 Potentially vulnerable development pankso@slitaz.org
SliTaz Current gtk+3 3.24.31 x-window pankso@slitaz.org
SliTaz Current gtk+3-demo 3.24.31 development pankso@slitaz.org
SliTaz Current gtk+3-dev 3.24.31 development pankso@slitaz.org
SliTaz Current gtk+3-widget-factory 3.24.31 development pankso@slitaz.org
SliTaz Current gtk+ 2.24.33 Potentially vulnerable x-window pankso@slitaz.org
SliTaz Current gtk+-dev 2.24.33 Potentially vulnerable development pankso@slitaz.org
SliTaz Current gtk-girepository 2.24.33 Potentially vulnerable development pankso@slitaz.org
SliTaz Next gtk3-demo 3.24.1 development al.bobylev@gmail.com
SliTaz Next gtk3-widget-factory 3.24.1 development al.bobylev@gmail.com
SliTaz Next gtk3-icon-browser 3.24.1 development al.bobylev@gmail.com
SliTaz Next gtk3-broadwayd 3.24.1 x-window al.bobylev@gmail.com
SliTaz Next gtk3-dev 3.24.1 development al.bobylev@gmail.com
SliTaz Next gtk3 3.24.1 x-window al.bobylev@gmail.com
SliTaz Next gtk3-demo 3.24.1 development al.bobylev@gmail.com
SliTaz Next gtk3-widget-factory 3.24.1 development al.bobylev@gmail.com
SliTaz Next gtk3-icon-browser 3.24.1 development al.bobylev@gmail.com
SliTaz Next gtk3-broadwayd 3.24.1 x-window al.bobylev@gmail.com
SliTaz Next gtk3-dev 3.24.1 development al.bobylev@gmail.com
SliTaz Next gtk3 3.24.1 x-window al.bobylev@gmail.com
SliTaz Next gtk2-demo 2.24.31 Potentially vulnerable development devel@slitaz.org
SliTaz Next gtk2 2.24.31 Potentially vulnerable x-window devel@slitaz.org
SliTaz Next gtk2-dev 2.24.31 Potentially vulnerable development devel@slitaz.org
SliTaz Next gtk2-demo 2.24.31 Potentially vulnerable development devel@slitaz.org
SliTaz Next gtk2 2.24.31 Potentially vulnerable x-window devel@slitaz.org
SliTaz Next gtk2-dev 2.24.31 Potentially vulnerable development devel@slitaz.org
Solus libgtk-4 4.18.5 desktop.gtk reilly@reillybrogan.com
Solus libgtk-4-dbginfo 4.18.5 debug reilly@reillybrogan.com
Solus libgtk-4-demos 4.18.5 desktop.gtk reilly@reillybrogan.com
Solus libgtk-4-devel 4.18.5 programming.devel reilly@reillybrogan.com
Solus the-widget-factory-3 3.24.49 desktop.gtk josephriches@gmail.com
Solus gtk3-demo 3.24.49 desktop.gtk josephriches@gmail.com
Solus gtk3-icon-browser 3.24.49 desktop.gtk josephriches@gmail.com
Solus libgtk-3 3.24.49 desktop.gtk josephriches@gmail.com
Solus libgtk-3-32bit 3.24.49 emul32 josephriches@gmail.com
Solus libgtk-3-32bit-dbginfo 3.24.49 debug josephriches@gmail.com
Solus libgtk-3-32bit-devel 3.24.49 programming.devel josephriches@gmail.com
Solus libgtk-3-dbginfo 3.24.49 debug josephriches@gmail.com
Solus libgtk-3-devel 3.24.49 programming.devel josephriches@gmail.com
Solus libgtk-3-docs 3.24.49 programming.docs josephriches@gmail.com
Solus gtk2-demo 2.24.33 Potentially vulnerable desktop.gtk reilly@reillybrogan.com
Solus libgtk-2 2.24.33 Potentially vulnerable desktop.gtk reilly@reillybrogan.com
Solus libgtk-2-32bit 2.24.33 Potentially vulnerable emul32 reilly@reillybrogan.com
Solus libgtk-2-32bit-dbginfo 2.24.33 Potentially vulnerable debug reilly@reillybrogan.com
Solus libgtk-2-32bit-devel 2.24.33 Potentially vulnerable programming.devel reilly@reillybrogan.com
Solus libgtk-2-dbginfo 2.24.33 Potentially vulnerable debug reilly@reillybrogan.com
Solus libgtk-2-devel 2.24.33 Potentially vulnerable programming.devel reilly@reillybrogan.com
Solus libgtk-2-docs 2.24.33 Potentially vulnerable programming.docs reilly@reillybrogan.com
stal/IX lib/gtk/4/gir 4.18.6 lib anton@samokhvalov.xyz
stal/IX lib/gtk/4/stock 4.18.6 lib anton@samokhvalov.xyz
stal/IX dev lib/gtk/4/gir 4.18.6 lib anton@samokhvalov.xyz
stal/IX dev lib/gtk/4/stock 4.18.6 lib anton@samokhvalov.xyz
T2 SDE gtk 4.18.6 extra/development rene@exactcode.de
T2 SDE gtk+ 3.24.49 extra/development rene@exactcode.de
T2 SDE gtk+2 2.24.33 Potentially vulnerable extra/development vadja@gmx.de
T2 SDE gtk+12 1.2.10 Potentially vulnerable extra/development rene@t2-project.org
Termux gtk4 4.18.6 - termux@github
Termux gtk3 3.24.49 - termux@github
Termux gtk2 2.24.33 Potentially vulnerable - termux@github
Trisquel 10.0
nabia-security/main
gtk+3.0 3.24.20 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, laney@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org
Trisquel 10.0
nabia-updates/main
gtk+3.0 3.24.20 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, laney@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org
Trisquel 10.0
nabia-updates/main
gtk+3.0 3.24.20 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, laney@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org
Trisquel 10.0
nabia/main
gtk+3.0 3.24.18 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, laney@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org
Trisquel 10.0
nabia/main
gtk+2.0 2.24.32 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org
Trisquel 10.0
nabia-security/main
gtk+2.0 2.24.32 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org
Trisquel 10.0
nabia-updates/main
gtk+2.0 2.24.32 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org
Trisquel 11.0
aramo-updates/main
gtk4 4.6.9 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, smcv@debian.org
Trisquel 11.0
aramo-security/main
gtk4 4.6.9 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, smcv@debian.org
Trisquel 11.0
aramo/main
gtk4 4.6.2 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, smcv@debian.org
Trisquel 11.0
aramo-updates/main
gtk+3.0 3.24.33 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@ubuntu.com, pkg-gnome-maintainers@lists.alioth.debian.org, smcv@debian.org
Trisquel 11.0
aramo-security/main
gtk+3.0 3.24.33 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@ubuntu.com, pkg-gnome-maintainers@lists.alioth.debian.org, smcv@debian.org
Trisquel 11.0
aramo/main
gtk+3.0 3.24.33 libs ubuntu-devel-discuss@lists.ubuntu.com, pkg-gnome-maintainers@lists.alioth.debian.org, smcv@debian.org
Trisquel 11.0
aramo-updates/main
gtk+2.0 2.24.33 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, pkg-gnome-maintainers@lists.alioth.debian.org
Trisquel 11.0
aramo-security/main
gtk+2.0 2.24.33 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, pkg-gnome-maintainers@lists.alioth.debian.org
Trisquel 11.0
aramo/main
gtk+2.0 2.24.33 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, pkg-gnome-maintainers@lists.alioth.debian.org
UBI 8
appstream
gtk3 3.22.30 Unspecified -
UBI 8
appstream
gtk2 2.24.32 Potentially vulnerable System Environment/Libraries -
Ubuntu 14.04
trusty/main
gtk+3.0 3.10.8 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, pkg-gnome-maintainers@lists.alioth.debian.org
Ubuntu 14.04
trusty-updates/main
gtk+3.0 3.10.8 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, pkg-gnome-maintainers@lists.alioth.debian.org
Ubuntu 14.04
trusty/main
gtk+2.0 2.24.23 Potentially vulnerable libs ubuntu-desktop@lists.ubuntu.com, biebl@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org
Ubuntu 14.04
trusty-updates/main
gtk+2.0 2.24.23 Potentially vulnerable libs ubuntu-desktop@lists.ubuntu.com, biebl@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org
Ubuntu 16.04
xenial-updates/main
gtk+3.0 3.18.9 libs ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org
Ubuntu 16.04
xenial/main
gtk+3.0 3.18.9 libs ubuntu-devel-discuss@lists.ubuntu.com, biebl@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org
Ubuntu 16.04
xenial-updates/main
gtk+2.0 2.24.30 Potentially vulnerable libs ubuntu-desktop@lists.ubuntu.com, biebl@debian.org, laney@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org
Ubuntu 16.04
xenial/main
gtk+2.0 2.24.30 Potentially vulnerable libs ubuntu-desktop@lists.ubuntu.com, biebl@debian.org, laney@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org
Ubuntu 18.04
bionic-updates/main
gtk+3.0 3.22.30 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org
Ubuntu 18.04
bionic/main
gtk+3.0 3.22.30 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org
Ubuntu 18.04
bionic/main
gtk+2.0 2.24.32 Potentially vulnerable libs ubuntu-desktop@lists.ubuntu.com, biebl@debian.org, jbicha@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org, pochu@debian.org
Ubuntu 20.04
focal-updates/main
gtk+3.0 3.24.20 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, laney@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org
Ubuntu 20.04
focal/main
gtk+3.0 3.24.18 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, laney@debian.org, pkg-gnome-maintainers@lists.alioth.debian.org
Ubuntu 20.04
focal-updates/main
gtk+2.0 2.24.32 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org
Ubuntu 20.04
focal/main
gtk+2.0 2.24.32 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org
Ubuntu 22.04
jammy-updates/main
gtk4 4.6.9 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, smcv@debian.org
Ubuntu 22.04
jammy/main
gtk4 4.6.2 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, smcv@debian.org
Ubuntu 22.04
jammy/main
gtk+3.0 3.24.33 libs ubuntu-devel-discuss@lists.ubuntu.com, pkg-gnome-maintainers@lists.alioth.debian.org, smcv@debian.org
Ubuntu 22.04
jammy-updates/main
gtk+3.0 3.24.33 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@ubuntu.com, pkg-gnome-maintainers@lists.alioth.debian.org, smcv@debian.org
Ubuntu 22.04
jammy/main
gtk+2.0 2.24.33 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, pkg-gnome-maintainers@lists.alioth.debian.org
Ubuntu 22.04
jammy-updates/main
gtk+2.0 2.24.33 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, pkg-gnome-maintainers@lists.alioth.debian.org
Ubuntu 24.04
noble/main
gtk4 4.14.2 libs ubuntu-devel-discuss@lists.ubuntu.com, bandali@ubuntu.com, jbicha@ubuntu.com, smcv@debian.org
Ubuntu 24.04
noble-updates/main
gtk4 4.14.2 libs ubuntu-devel-discuss@lists.ubuntu.com, bandali@ubuntu.com, jbicha@ubuntu.com, smcv@debian.org
Ubuntu 24.04
noble/main
gtk+3.0 3.24.41 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@ubuntu.com, mitya57@debian.org, smcv@debian.org
Ubuntu 24.04
noble-updates/main
gtk+3.0 3.24.41 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@ubuntu.com, mitya57@debian.org, smcv@debian.org
Ubuntu 24.04
noble/main
gtk+2.0 2.24.33 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, pochu@debian.org
Ubuntu 24.04
noble-updates/main
gtk+2.0 2.24.33 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@debian.org, pochu@debian.org
Ubuntu 24.10
oracular-updates/main
gtk4 4.16.3 libs ubuntu-devel-discuss@lists.ubuntu.com, bandali@ubuntu.com, jbicha@ubuntu.com, smcv@debian.org
Ubuntu 24.10
oracular/main
gtk4 4.16.2 libs pkg-gnome-maintainers@lists.alioth.debian.org, bandali@ubuntu.com, jbicha@ubuntu.com, smcv@debian.org
Ubuntu 24.10
oracular-updates/main
gtk+3.0 3.24.43 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@ubuntu.com, mitya57@debian.org, smcv@debian.org
Ubuntu 24.10
oracular/main
gtk+3.0 3.24.43 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@ubuntu.com, mitya57@debian.org, smcv@debian.org
Ubuntu 24.10
oracular/main
gtk+2.0 2.24.33 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@ubuntu.com, pochu@debian.org
Ubuntu 25.04
plucky/main
gtk4 4.18.4 libs pkg-gnome-maintainers@lists.alioth.debian.org, bandali@ubuntu.com, jbicha@ubuntu.com, smcv@debian.org
Ubuntu 25.04
plucky/main
gtk+3.0 3.24.49 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@ubuntu.com, mitya57@debian.org, smcv@debian.org
Ubuntu 25.04
plucky/main
gtk+2.0 2.24.33 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@ubuntu.com, pochu@debian.org
Ubuntu 25.10
questing/main
gtk4 4.18.5 libs ubuntu-devel-discuss@lists.ubuntu.com, bandali@ubuntu.com, jbicha@ubuntu.com, smcv@debian.org
Ubuntu 25.10
questing/main
gtk+3.0 3.24.49 libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@ubuntu.com, mitya57@debian.org, smcv@debian.org
Ubuntu 25.10
questing/main
gtk+2.0 2.24.33 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com, jbicha@ubuntu.com, pochu@debian.org
Vcpkg gtk 4.16.3 - -
Vcpkg gtk3 3.24.43 - -
Void Linux x86_64
x86_64
gtk4 4.18.5 - orphan@voidlinux.org
Void Linux x86_64
x86_64
gtk4-demo 4.18.5 - orphan@voidlinux.org
Void Linux x86_64
x86_64
gtk4-devel 4.18.5 - orphan@voidlinux.org
Void Linux x86_64
x86_64
gtk4-doc 4.18.5 - orphan@voidlinux.org
Void Linux x86_64
x86_64
gtk4-update-icon-cache 4.18.5 - orphan@voidlinux.org
Void Linux x86_64
x86_64
gtk+3 3.24.49 - gottox@voidlinux.org
Void Linux x86_64
x86_64
gtk+3-demo 3.24.49 - gottox@voidlinux.org
Void Linux x86_64
x86_64
gtk+3-devel 3.24.49 - gottox@voidlinux.org
Void Linux x86_64
x86_64
gtk-update-icon-cache 3.24.49 - gottox@voidlinux.org
Void Linux x86_64
x86_64
gtk+ 2.24.33 Potentially vulnerable - orphan@voidlinux.org
Void Linux x86_64
x86_64
gtk+-demo 2.24.33 Potentially vulnerable - orphan@voidlinux.org
Void Linux x86_64
x86_64
gtk+-devel 2.24.33 Potentially vulnerable - orphan@voidlinux.org
Wikidata GTK 4.18.6 - -