Versions Packages Information History CVEs Related Badges Report

Versions for linux

3814 package(s) known

Repository Package name Version Category Maintainer(s)
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified packager@almalinux.org
Alpine Linux 3.15
community
linux-edge4virt 5.17.9 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
community
linux-edge4virt-dev 5.17.9 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
community
linux-edge-dev 5.17.9 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
community
linux-edge 5.17.9 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
main
linux-lts 5.15.140 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
linux-lts-dev 5.15.140 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
linux-virt 5.15.140 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
linux-virt-dev 5.15.140 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
community
linux-tools-dev 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
community
cpupower-openrc 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
community
linux-tools-usbip 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
community
linux-tools-tmon 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
community
perf-bash-completion 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
community
cpupower 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
community
linux-tools-usbip-openrc 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
community
linux-tools-gpio 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
community
linux-tools-doc 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
community
linux-tools-iio 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
community
linux-tools 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
community
perf 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.15
main
linux-headers 5.10.41 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
linux-edge 6.0.11 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-edge-dev 6.0.11 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-edge-doc 6.0.11 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
main
linux-headers 5.16.7 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
linux-virt 5.15.159 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
linux-lts-dev 5.15.159 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
linux-virt-dev 5.15.159 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
linux-lts 5.15.159 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
linux-tools-dev 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools-tmon 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools-doc 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
cpupower 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
perf 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools-usbip 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
cpupower-bash-completion 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools-iio 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
perf-bash-completion 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools-usbip-openrc 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
linux-tools-gpio 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.16
community
cpupower-openrc 5.15.35 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-edge-dev 6.3.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-edge-doc 6.3.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-edge 6.3.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
main
linux-headers 5.19.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
linux-virt 5.15.173 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
linux-lts-dev 5.15.173 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
linux-virt-dev 5.15.173 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
linux-lts-doc 5.15.173 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
linux-lts 5.15.173 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
cpupower 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
bpftool-bash-completion 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-tmon 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-doc 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
bpftool 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
perf-bash-completion 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-iio 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
perf 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-spi 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-usbip 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-usbip-openrc 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-gpio 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
cpupower-bash-completion 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools-dev 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
cpupower-openrc 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.17
community
linux-tools 5.15.74 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-edge 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-edge-dev 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-edge-doc 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
bpftool 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
bpftool-bash-completion 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
cpupower 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
cpupower-bash-completion 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
cpupower-openrc 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-dev 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-doc 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-gpio 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-iio 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-spi 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-tmon 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-usbip 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
linux-tools-usbip-openrc 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
perf 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
community
perf-bash-completion 6.3.12 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.18
main
linux-headers 6.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
linux-lts 6.1.140 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
linux-lts-dev 6.1.140 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
linux-lts-doc 6.1.140 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
linux-virt 6.1.140 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
linux-virt-dev 6.1.140 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
community
linux-edge 6.9.1 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-edge-dev 6.9.1 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-edge-doc 6.9.1 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
main
linux-lts 6.6.93 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
linux-lts-dev 6.6.93 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
linux-lts-doc 6.6.93 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
linux-virt 6.6.93 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
main
linux-virt-dev 6.6.93 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.19
community
bpftool 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
bpftool-bash-completion 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
cpupower 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
cpupower-bash-completion 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
cpupower-openrc 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-dev 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-doc 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-gpio 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-iio 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-spi 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-tmon 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-usbip 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
linux-tools-usbip-openrc 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
perf 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
community
perf-bash-completion 6.6.4 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.19
main
linux-headers 6.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
community
linux-edge 6.12.1 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-edge-dev 6.12.1 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-edge-doc 6.12.1 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
main
linux-lts 6.6.93 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
main
linux-lts-dev 6.6.93 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
main
linux-lts-doc 6.6.93 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
main
linux-virt 6.6.93 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
main
linux-virt-dev 6.6.93 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.20
community
perf 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
perf-bash-completion 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
bpftool 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
bpftool-bash-completion 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
cpupower 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
cpupower-bash-completion 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
cpupower-openrc 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-dev 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-doc 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-gpio 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-iio 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-spi 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-tmon 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-usbip 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
community
linux-tools-usbip-openrc 6.6.31 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.20
main
linux-headers 6.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
community
linux-edge 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-edge-dev 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-edge-doc 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
main
linux-lts 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
main
linux-lts-dev 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
main
linux-lts-doc 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
main
linux-virt 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
main
linux-virt-dev 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.21
community
perf 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
perf-bash-completion 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
bpftool 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
bpftool-bash-completion 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
cpupower 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
cpupower-bash-completion 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
cpupower-openrc 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-dev 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-doc 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-gpio 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-iio 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-spi 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-tmon 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-usbip 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
community
linux-tools-usbip-openrc 6.11.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.21
main
linux-headers 6.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
community
perf 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
perf-bash-completion 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
bpftool 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
bpftool-bash-completion 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
cpupower 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
cpupower-bash-completion 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
cpupower-openrc 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-edge 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-edge-dev 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-edge-doc 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-dev 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-doc 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-gpio 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-iio 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-spi 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-tmon 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-usbip 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
community
linux-tools-usbip-openrc 6.15.0 Potentially vulnerable - mps@arvanta.net
Alpine Linux 3.22
main
linux-headers 6.14.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
main
linux-lts 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
main
linux-lts-dev 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
main
linux-lts-doc 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
main
linux-virt 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.22
main
linux-virt-dev 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
bpftool 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
bpftool-bash-completion 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
cpupower 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
cpupower-bash-completion 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
cpupower-openrc 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
linux-stable 6.15.3 Potentially vulnerable - fossdd@pwned.life
Alpine Linux Edge
community
linux-stable-dev 6.15.3 Potentially vulnerable - fossdd@pwned.life
Alpine Linux Edge
community
linux-stable-doc 6.15.3 Potentially vulnerable - fossdd@pwned.life
Alpine Linux Edge
community
linux-tools 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
linux-tools-dev 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
linux-tools-doc 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
linux-tools-gpio 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
linux-tools-iio 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
linux-tools-spi 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
linux-tools-tmon 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
linux-tools-usbip 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
linux-tools-usbip-openrc 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
perf 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
community
perf-bash-completion 6.15.3 Potentially vulnerable - mps@arvanta.net
Alpine Linux Edge
main
linux-headers 6.15.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
linux-lts 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
linux-lts-dev 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
linux-lts-doc 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
linux-virt 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
linux-virt-dev 6.12.33 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 linux-tools 5.10 Potentially vulnerable Development/Tools vt@altlinux.org
ALT Linux p9 usbip 2.0.4 Potentially vulnerable System/Configuration/Networking pv@altlinux.org
ALT Linux p10 linux-tools 6.1 Potentially vulnerable Development/Tools vt@altlinux.org
ALT Linux p10 usbip 5.10 Potentially vulnerable System/Configuration/Networking pv@altlinux.org
ALT Linux p11 linux-tools 6.9 Potentially vulnerable Development/Tools vt@altlinux.org
ALT Linux p11 usbip 5.10 Potentially vulnerable System/Configuration/Networking pv@altlinux.org
ALT Sisyphus linux-tools 6.15 Potentially vulnerable Development/Tools guschin@altlinux.org
ALT Sisyphus usbip 5.10 Potentially vulnerable System/Configuration/Networking pv@altlinux.org
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.353 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.352 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.352 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.350 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.349 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.348 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.348 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.343 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.334 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.330 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.328 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.326 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.322 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.322 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.320 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.320 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.318 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.318 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.314 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.314 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.313 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.311 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.309 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.305 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.301 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.299 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.294 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.287 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.285 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.281 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.275 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.273 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.268 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.262 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.262 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.252 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.248 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.238 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.238 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.232 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.225 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.225 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.219 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.214 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.209 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.203 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.200 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.193 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.186 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.181 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.177 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.173 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.171 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.165 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.165 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.158 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.154 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.152 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.146 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.143 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.138 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.133 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.133 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.128 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.123 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.121 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.114 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.114 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.109 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.106 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.104 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.101 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.97 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.94 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.88 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.88 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.77 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.77 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.77 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.72 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.70 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.67 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.62 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.59 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.55 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.51 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.47 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.42 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.33 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
updates
kernel 4.14.33 Potentially vulnerable System Environment/Kernel -
Amazon Linux 1
main
kernel 4.14.26 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.355 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.353 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.352 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.352 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.352 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.350 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.349 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.348 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.348 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.345 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.344 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.343 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.343 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.343 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.336 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.334 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.330 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.328 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.327 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.326 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.322 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.322 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.322 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.320 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.320 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.318 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.318 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.314 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.314 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.313 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.311 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.309 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.305 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.304 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.301 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.301 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.299 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.296 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.294 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.291 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.290 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.287 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.285 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.281 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.276 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.275 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.273 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.268 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.262 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.256 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.252 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.252 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.248 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.246 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.243 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.241 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.238 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.238 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.232 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.232 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.231 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.231 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.225 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.225 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.219 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.219 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.214 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.209 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.209 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.203 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.200 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.198 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.193 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.192 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.186 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.181 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.181 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.177 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.177 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.173 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.173 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.171 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.165 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.165 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.158 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.154 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.152 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.152 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.146 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.146 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.143 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.138 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.133 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.133 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.128 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.123 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.121 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.114 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.114 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.109 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.106 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.104 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.101 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.97 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.94 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.88 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.88 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.77 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.77 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.77 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.72 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.70 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.67 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.62 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.59 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.55 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.51 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.47 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.47 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.42 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.33 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.33 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.14.26 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.85 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.85 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.81 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.77 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.76 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.75 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.70 Potentially vulnerable System Environment/Kernel -
Amazon Linux 2 kernel 4.9.62 Potentially vulnerable System Environment/Kernel -
AOSC kernel-tools 6.14.10 Potentially vulnerable utils fallback-mnt-aosc@repology
AOSC linux-kernel-6.14.10 6.14.10 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-6.14.9 6.14.9 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.12.32 6.12.32 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.12.31 6.12.31 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.12.28 6.12.28 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-6.10.10 6.10.10 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-6.10.8 6.10.8 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-6.10.5 6.10.5 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.61 6.6.61 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.54 6.6.54 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.53 6.6.53 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.50 6.6.50 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.47 6.6.47 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.46 6.6.46 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.41 6.6.41 Potentially vulnerable kernel fallback-mnt-aosc@repology
AOSC linux-kernel-lts-6.6.31 6.6.31 Potentially vulnerable kernel fallback-mnt-aosc@repology
Apertis v2023
v2023/target
linux 6.1.128 Potentially vulnerable - debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Apertis v2024
v2024/target
linux 6.6.87 Potentially vulnerable - debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Apertis v2025
v2025/target
linux 6.12.17 Potentially vulnerable - debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Apertis v2026 Development
v2026dev1/target
linux 6.12.27 Potentially vulnerable - debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Arch Linux
core
linux-headers 6.15.3.arch1 Potentially vulnerable - -
Arch Linux
core
linux-docs 6.15.3.arch1 Potentially vulnerable - -
Arch Linux
core
linux 6.15.3.arch1 Potentially vulnerable - -
Arch Linux
extra
tmon 6.15 Potentially vulnerable - -
Arch Linux
extra
intel-speed-select 6.15 Potentially vulnerable - -
Arch Linux
extra
hyperv 6.15 Potentially vulnerable - -
Arch Linux
extra
usbip 6.15 Potentially vulnerable - -
Arch Linux
extra
linux-tools-meta 6.15 Potentially vulnerable - -
Arch Linux
extra
cpupower 6.15 Potentially vulnerable - -
Arch Linux
extra
x86_energy_perf_policy 6.15 Potentially vulnerable - -
Arch Linux
extra
bootconfig 6.15 Potentially vulnerable - -
Arch Linux
extra
perf 6.15 Potentially vulnerable - -
Arch Linux
extra
kcpuid 6.15 Potentially vulnerable - -
Arch Linux
extra
turbostat 6.15 Potentially vulnerable - -
Arch Linux
extra
bpf 6.15 Potentially vulnerable - -
Arch Linux
core
linux-api-headers 6.15 Potentially vulnerable - -
Arch Linux
core
linux-lts-headers 6.12.34 Potentially vulnerable - -
Arch Linux
core
linux-lts-docs 6.12.34 Potentially vulnerable - -
Arch Linux
core
linux-lts 6.12.34 Potentially vulnerable - -
Arch Linux 32 i486
core
linux-api-headers 6.14 Potentially vulnerable - -
Arch Linux 32 i486
core
linux 6.9.7.arch1 Potentially vulnerable - -
Arch Linux 32 i486
core
linux-docs 6.9.7.arch1 Potentially vulnerable - -
Arch Linux 32 i486
core
linux-headers 6.9.7.arch1 Potentially vulnerable - -
Arch Linux 32 i486
extra
bootconfig 5.17 Potentially vulnerable - -
Arch Linux 32 i486
extra
tmon 5.17 Potentially vulnerable - -
Arch Linux 32 i486
extra
bpf 5.17 Potentially vulnerable - -
Arch Linux 32 i486
extra
cgroup_event_listener 5.17 Potentially vulnerable - -
Arch Linux 32 i486
extra
cpupower 5.17 Potentially vulnerable - -
Arch Linux 32 i486
extra
perf 5.17 Potentially vulnerable - -
Arch Linux 32 i486
extra
linux-tools-meta 5.17 Potentially vulnerable - -
Arch Linux 32 i486
extra
hyperv 5.17 Potentially vulnerable - -
Arch Linux 32 i486
extra
turbostat 5.17 Potentially vulnerable - -
Arch Linux 32 i486
extra
x86_energy_perf_policy 5.17 Potentially vulnerable - -
Arch Linux 32 i486
extra
usbip 5.17 Potentially vulnerable - -
Arch Linux 32 i686
core
linux-api-headers 6.14 Potentially vulnerable - -
Arch Linux 32 i686
core
linux-lts-docs 6.12.13 Potentially vulnerable - -
Arch Linux 32 i686
core
linux-lts 6.12.13 Potentially vulnerable - -
Arch Linux 32 i686
core
linux-lts-headers 6.12.13 Potentially vulnerable - -
Arch Linux 32 i686
core
linux-docs 6.12.4.arch1 Potentially vulnerable - -
Arch Linux 32 i686
core
linux-headers 6.12.4.arch1 Potentially vulnerable - -
Arch Linux 32 i686
core
linux 6.12.4.arch1 Potentially vulnerable - -
Arch Linux 32 i686
extra
linux-tools-meta 5.17 Potentially vulnerable - -
Arch Linux 32 i686
extra
cpupower 5.17 Potentially vulnerable - -
Arch Linux 32 i686
extra
cgroup_event_listener 5.17 Potentially vulnerable - -
Arch Linux 32 i686
extra
turbostat 5.17 Potentially vulnerable - -
Arch Linux 32 i686
extra
bootconfig 5.17 Potentially vulnerable - -
Arch Linux 32 i686
extra
usbip 5.17 Potentially vulnerable - -
Arch Linux 32 i686
extra
perf 5.17 Potentially vulnerable - -
Arch Linux 32 i686
extra
bpf 5.17 Potentially vulnerable - -
Arch Linux 32 i686
extra
tmon 5.17 Potentially vulnerable - -
Arch Linux 32 i686
extra
x86_energy_perf_policy 5.17 Potentially vulnerable - -
Arch Linux 32 i686
extra
hyperv 5.17 Potentially vulnerable - -
Arch Linux 32 pentium4
core
linux-api-headers 6.14 Potentially vulnerable - -
Arch Linux 32 pentium4
core
linux-lts-docs 6.12.13 Potentially vulnerable - -
Arch Linux 32 pentium4
core
linux-lts-headers 6.12.13 Potentially vulnerable - -
Arch Linux 32 pentium4
core
linux-lts 6.12.13 Potentially vulnerable - -
Arch Linux 32 pentium4
core
linux-docs 6.12.4.arch1 Potentially vulnerable - -
Arch Linux 32 pentium4
core
linux-headers 6.12.4.arch1 Potentially vulnerable - -
Arch Linux 32 pentium4
core
linux 6.12.4.arch1 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
hyperv 5.17 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
bootconfig 5.17 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
turbostat 5.17 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
linux-tools-meta 5.17 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
perf 5.17 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
tmon 5.17 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
x86_energy_perf_policy 5.17 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
cpupower 5.17 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
cgroup_event_listener 5.17 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
usbip 5.17 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
bpf 5.17 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
bpf 6.15 Potentially vulnerable - -
Arch Linux ARM aarch64
core
linux-api-headers 6.15 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
usbip 6.15 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
bootconfig 6.15 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
tmon 6.15 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
perf 6.15 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
cpupower 6.15 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
gpio-utils 6.15 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
iio-utils 6.15 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
linux-tools-meta 6.15 Potentially vulnerable - -
Arch Linux ARM aarch64
community
cgroup_event_listener 6.2 Potentially vulnerable - -
Arch Linux ARM aarch64
community
linux-tools-meta 6.2 Potentially vulnerable - -
Arch Linux ARM aarch64
community
tmon 6.2 Potentially vulnerable - -
Arch Linux ARM aarch64
community
bpf 6.2 Potentially vulnerable - -
Arch Linux ARM aarch64
community
bootconfig 6.2 Potentially vulnerable - -
Arch Linux ARM aarch64
community
usbip 6.2 Potentially vulnerable - -
Arch Linux ARM aarch64
community
gpio-utils 6.2 Potentially vulnerable - -
Arch Linux ARM aarch64
community
iio-utils 6.2 Potentially vulnerable - -
Arch Linux ARM aarch64
community
cpupower 6.2 Potentially vulnerable - -
Arch Linux ARM aarch64
community
hyperv 6.2 Potentially vulnerable - -
Arch Linux ARM aarch64
community
perf 6.2 Potentially vulnerable - -
ArchPOWER powerpc linux-headers 6.14.7.arch1 Potentially vulnerable - -
ArchPOWER powerpc linux 6.14.7.arch1 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-6.12 6.12.30 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-6.12-headers 6.12.30 Potentially vulnerable - -
ArchPOWER powerpc cpupower 6.12 Potentially vulnerable - -
ArchPOWER powerpc tmon 6.12 Potentially vulnerable - -
ArchPOWER powerpc bpf 6.12 Potentially vulnerable - -
ArchPOWER powerpc perf 6.12 Potentially vulnerable - -
ArchPOWER powerpc usbip 6.12 Potentially vulnerable - -
ArchPOWER powerpc linux-tools-meta 6.12 Potentially vulnerable - -
ArchPOWER powerpc bootconfig 6.12 Potentially vulnerable - -
ArchPOWER powerpc linux-api-headers 6.10 Potentially vulnerable - -
ArchPOWER powerpc cgroup_event_listener 6.7 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-6.6-headers 6.6.92 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-6.6 6.6.92 Potentially vulnerable - -
ArchPOWER powerpc linux-lts 6.6.87 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-headers 6.6.87 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-6.1-headers 6.1.140 Potentially vulnerable - -
ArchPOWER powerpc linux-lts-6.1 6.1.140 Potentially vulnerable - -
ArchPOWER powerpc64le linux-headers 6.14.7.arch1 Potentially vulnerable - -
ArchPOWER powerpc64le linux 6.14.7.arch1 Potentially vulnerable - -
ArchPOWER powerpc64le perf 6.13 Potentially vulnerable - -
ArchPOWER powerpc64le usbip 6.13 Potentially vulnerable - -
ArchPOWER powerpc64le cpupower 6.13 Potentially vulnerable - -
ArchPOWER powerpc64le bootconfig 6.13 Potentially vulnerable - -
ArchPOWER powerpc64le linux-tools-meta 6.13 Potentially vulnerable - -
ArchPOWER powerpc64le tmon 6.13 Potentially vulnerable - -
ArchPOWER powerpc64le bpf 6.13 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-6.12 6.12.30 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-6.12-headers 6.12.30 Potentially vulnerable - -
ArchPOWER powerpc64le linux-api-headers 6.10 Potentially vulnerable - -
ArchPOWER powerpc64le cgroup_event_listener 6.7 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-6.6 6.6.92 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-6.6-headers 6.6.92 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts 6.6.87 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-headers 6.6.87 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-6.1 6.1.140 Potentially vulnerable - -
ArchPOWER powerpc64le linux-lts-6.1-headers 6.1.140 Potentially vulnerable - -
ArchPOWER riscv64 tmon 6.13 Potentially vulnerable - -
ArchPOWER riscv64 usbip 6.13 Potentially vulnerable - -
ArchPOWER riscv64 perf 6.13 Potentially vulnerable - -
ArchPOWER riscv64 bpf 6.13 Potentially vulnerable - -
ArchPOWER riscv64 bootconfig 6.13 Potentially vulnerable - -
ArchPOWER riscv64 linux-tools-meta 6.13 Potentially vulnerable - -
ArchPOWER riscv64 cpupower 6.13 Potentially vulnerable - -
ArchPOWER riscv64 linux-api-headers 6.10 Potentially vulnerable - -
ArchPOWER riscv64 cgroup_event_listener 6.7 Potentially vulnerable - -
ArchPOWER riscv64 linux-headers 5.14.16.arch1 Potentially vulnerable - -
ArchPOWER riscv64 linux 5.14.16.arch1 Potentially vulnerable - -
AUR linux-next-git 20250424.r0.g393d0c54cae3 - ptr1337@aur, gromit@aur
AUR linux-next-git-headers 20250424.r0.g393d0c54cae3 - ptr1337@aur, gromit@aur
AUR linux-git 6.15.r13627.119b1e61a769 - osimarr@aur
AUR linux-git-headers 6.15.r13627.119b1e61a769 - osimarr@aur
AUR linux-lts-515-git 5.15.136 - akusari@aur
AUR linux-lts-515-git-headers 5.15.136 - akusari@aur
AUR linux-mainline 6.16rc2 Potentially vulnerable - miffe@aur
AUR linux-mainline-headers 6.16rc2 Potentially vulnerable - miffe@aur
AUR linux-mainline-docs 6.16rc2 Potentially vulnerable - miffe@aur
AUR linux-lts66 6.6.93 Potentially vulnerable - severach@aur
AUR linux-lts66-headers 6.6.93 Potentially vulnerable - severach@aur
AUR linux-lts66-docs 6.6.93 Potentially vulnerable - severach@aur
AUR linux-lts61 6.1.141 Potentially vulnerable - severach@aur
AUR linux-lts61-headers 6.1.141 Potentially vulnerable - severach@aur
AUR linux-lts61-docs 6.1.141 Potentially vulnerable - severach@aur
AUR linux-lts515 5.15.185 Potentially vulnerable - andreas_baumann@aur, severach@aur
AUR linux-lts515-headers 5.15.185 Potentially vulnerable - andreas_baumann@aur, severach@aur
AUR linux-lts515-docs 5.15.185 Potentially vulnerable - andreas_baumann@aur, severach@aur
AUR linux-lts510 5.10.238 Potentially vulnerable - severach@aur
AUR linux-lts510-headers 5.10.238 Potentially vulnerable - severach@aur
AUR linux-lts510-docs 5.10.238 Potentially vulnerable - severach@aur
AUR linux-lts54 5.4.294 Potentially vulnerable - severach@aur
AUR linux-lts54-headers 5.4.294 Potentially vulnerable - severach@aur
AUR linux-lts54-docs 5.4.294 Potentially vulnerable - severach@aur
Artix
system
linux 6.15.2.artix1 Potentially vulnerable - -
Artix
system
linux-docs 6.15.2.artix1 Potentially vulnerable - -
Artix
system
linux-headers 6.15.2.artix1 Potentially vulnerable - -
Artix
world
linux-tools-meta 6.15 Potentially vulnerable - -
Artix
system
linux-api-headers 6.15 Potentially vulnerable - -
Artix
world
perf 6.15 Potentially vulnerable - -
Artix
world
turbostat 6.15 Potentially vulnerable - -
Artix
world
x86_energy_perf_policy 6.15 Potentially vulnerable - -
Artix
world
hyperv 6.15 Potentially vulnerable - -
Artix
world
cpupower 6.15 Potentially vulnerable - -
Artix
world
bpf 6.15 Potentially vulnerable - -
Artix
world
usbip 6.15 Potentially vulnerable - -
Artix
world
bootconfig 6.15 Potentially vulnerable - -
Artix
world
intel-speed-select 6.15 Potentially vulnerable - -
Artix
world
kcpuid 6.15 Potentially vulnerable - -
Artix
world
tmon 6.15 Potentially vulnerable - -
Artix
system
linux-lts-headers 6.12.32 Potentially vulnerable - -
Artix
system
linux-lts-docs 6.12.32 Potentially vulnerable - -
Artix
system
linux-lts 6.12.32 Potentially vulnerable - -
Artix
galaxy
linux-lts515-headers 5.15.160 Potentially vulnerable - -
Artix
galaxy
linux-lts515 5.15.160 Potentially vulnerable - -
Artix
galaxy
linux-lts515-docs 5.15.160 Potentially vulnerable - -
Carbs Linux
core
linux-headers 6.11.2 Potentially vulnerable - cem@carbslinux.org
Carbs Linux
alternatives/linux-headers-lts
linux-headers lts Potentially vulnerable - cem@carbslinux.org
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
os
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel -
CentOS 6
os
cpupowerutils 1.3 Potentially vulnerable System Environment/Base -
CentOS 6
os
tmon 0.9 Potentially vulnerable System Environment/Base -
CentOS 7
updates
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
os
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 7
updates
kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
CentOS 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel builder@centos.org
CentOS Stream 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 10
BaseOS
kernel 6.12.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 10
BaseOS
kernel 6.12.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 10
BaseOS
kernel 6.12.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 10
BaseOS
kernel 6.12.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 10
BaseOS
kernel 6.12.0 Potentially vulnerable Unspecified builder@centos.org
Chimera Linux
main
linux-stable-devel 6.15.2 Potentially vulnerable - -
Chimera Linux
main
cpupower 6.15.2 Potentially vulnerable - -
Chimera Linux
main
cpupower-bashcomp 6.15.2 Potentially vulnerable - -
Chimera Linux
main
cpupower-devel 6.15.2 Potentially vulnerable - -
Chimera Linux
main
cpupower-man 6.15.2 Potentially vulnerable - -
Chimera Linux
main
linux-stable 6.15.2 Potentially vulnerable - -
Chimera Linux
main
perf-bashcomp 6.13.6 Potentially vulnerable - -
Chimera Linux
main
perf-man 6.13.6 Potentially vulnerable - -
Chimera Linux
main
perf-zshcomp 6.13.6 Potentially vulnerable - -
Chimera Linux
main
perf 6.13.6 Potentially vulnerable - -
Chimera Linux
main
linux-headers 6.13.1 Potentially vulnerable - -
Chimera Linux
main
linux-lts 6.12.33 Potentially vulnerable - -
Chimera Linux
main
linux-lts-devel 6.12.33 Potentially vulnerable - -
Chocolatey usbip (Install) 0.1.0 Potentially vulnerable - -
Chromebrew perf 4.14 Potentially vulnerable - -
ConanCenter perf 5.13 Potentially vulnerable - -
Debian 10
buster/updates/main
linux-5.10 5.10.218 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 10
buster/updates/main
linux-5.10 5.10.216 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 10
buster/updates/main
linux-5.10 5.10.209 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 10
buster/updates/main
linux-5.10 5.10.205 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 10
buster/updates/main
linux-5.10 5.10.197 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 10
buster/updates/main
linux-5.10 5.10.179 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 10
buster/updates/main
linux 4.19.316 Potentially vulnerable kernel debian-kernel@lists.debian.org, ben@decadent.org.uk, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 10
buster/updates/main
linux 4.19.304 Potentially vulnerable kernel debian-kernel@lists.debian.org, ben@decadent.org.uk, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 10
buster/updates/main
linux 4.19.289 Potentially vulnerable kernel debian-kernel@lists.debian.org, ben@decadent.org.uk, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 10
buster/main
linux 4.19.249 Potentially vulnerable kernel debian-kernel@lists.debian.org, ben@decadent.org.uk, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 10
buster/main
linux 4.19.235 Potentially vulnerable kernel debian-kernel@lists.debian.org, ben@decadent.org.uk, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 10
buster/main
linux 4.19.194 Potentially vulnerable kernel debian-kernel@lists.debian.org, ben@decadent.org.uk, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 10
buster/main
linux 4.19.20 Potentially vulnerable kernel debian-kernel@lists.debian.org, ben@decadent.org.uk, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 10
buster/main
linux 4.19.16 Potentially vulnerable kernel debian-kernel@lists.debian.org, ben@decadent.org.uk, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 10 Backports
buster-backports/main
linux 5.10.127 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye-security/main
linux-6.1 6.1.137 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye-security/main
linux-6.1 6.1.129 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye-security/main
linux-6.1 6.1.128 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye-security/main
linux-6.1 6.1.119 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye-security/main
linux 5.10.237 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye-security/main
linux 5.10.234 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye/main
linux 5.10.223 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye/main
linux 5.10.218 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye/main
linux 5.10.46 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye/main
linux 5.10.28 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11
bullseye/main
linux 5.10.13 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11 Backports
bullseye-backports/main
linux 6.1.94 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 11 Backports
bullseye-backports/main
linux 6.1.90 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12
bookworm-security/main
linux 6.1.140 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12
bookworm-security/main
linux 6.1.139 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12
bookworm/main
linux 6.1.137 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12
bookworm-security/main
linux 6.1.135 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12
bookworm/main
linux 6.1.133 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12
bookworm-security/main
linux 6.1.133 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12
bookworm/main
linux 6.1.129 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12
bookworm/main
linux 6.1.8 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12
bookworm/main
linux 6.1.4 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12 Backports
bookworm-backports/main
linux 6.12.30 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12 Backports
bookworm-backports/main
linux 6.12.27 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12 Backports
bookworm-backports/main
linux 6.12.22 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12 Backports
bookworm-backports/main
linux 6.12.12 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 12 Backports
bookworm-backports/main
linux 6.5.10 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13
trixie/main
linux 6.12.32 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13
trixie-security/main
linux 6.12.31 Potentially vulnerable misc debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13
trixie/main
linux 6.12.29 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13
trixie/main
linux 6.12.27 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian 13
trixie/main
linux 6.12.8 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.12.33 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.12.32 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.12.30 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.12.29 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.12.27 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.12.25 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Unstable
sid/main
linux 6.12.8 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Experimental
experimental/main
linux 6.15.3 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Experimental
experimental/main
linux 6.15~rc7 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Experimental
experimental/main
linux 6.14.6 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Experimental
experimental/main
linux 6.14.3 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Experimental
experimental/main
linux 6.13.11 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Experimental
experimental/main
linux 6.13.8 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Experimental
experimental/main
linux 6.13~rc7 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Debian Experimental
experimental/main
linux 6.13~rc6 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
deepin 20
main
linux 5.15.5 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
deepin 20
main
linux 5.10.84 Potentially vulnerable - debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
deepin 23
main
linux 6.6.9 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Devuan 3.0
beowulf/main
linux 4.19.249 Potentially vulnerable kernel debian-kernel@lists.debian.org, ben@decadent.org.uk, carnil@debian.org, maks@debian.org, waldi@debian.org
Devuan 4.0
chimaera/main
linux 5.10.223 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Devuan Unstable
unstable/main
linux 6.12.33 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
distri linux 5.6.5 Potentially vulnerable - -
ELRepo el8 usbip-utils 0.0 Potentially vulnerable System Environment/Base -
ELRepo el9 usbip-utils 0.0 Potentially vulnerable System Environment/Base phil@elrepo.org
Endless OS 4.0
endless
linux 5.11.0 Potentially vulnerable main kernel-team@lists.ubuntu.com
Endless OS master
endless
linux 6.14.0 Potentially vulnerable main kernel-team@lists.ubuntu.com
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 8
baseos
kernel 4.18.0 Potentially vulnerable System Environment/Kernel -
EuroLinux 9
appstream
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
appstream
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
kernel 5.14.0 Potentially vulnerable Unspecified -
EuroLinux 9
powertools
kernel 5.14.0 Potentially vulnerable Unspecified -
Exherbo
arbor
sys-kernel/linux-headers 6.15 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.14 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.13 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.12 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.11 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.10 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.9 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.8 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.7 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
CleverCloud
sys-analyzer/perf 6.7 Potentially vulnerable sys-analyzer fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.6 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.5 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.4 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.3 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.2 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.1 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
kepstin
sys-apps/turbostat 6.1 Potentially vulnerable sys-apps fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 6.0 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
hardware
sys-power/cpupowerutils 6.0 Potentially vulnerable sys-power fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 5.19 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 5.18 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
hardware
sys-power/cpupowerutils 5.18 Potentially vulnerable sys-power fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 5.17 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 5.16 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 5.15 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 5.10 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Exherbo
hardware
sys-power/cpupowerutils 5.10 Potentially vulnerable sys-power fallback-mnt-exherbo@repology
Exherbo
arbor
sys-kernel/linux-headers 5.4 Potentially vulnerable sys-kernel fallback-mnt-exherbo@repology
Fedora 37
updates
kernel 6.5.12 Potentially vulnerable Unspecified -
Fedora 37
updates
kernel-headers 6.5.4 Potentially vulnerable Unspecified -
Fedora 37
updates
kernel-tools 6.5.4 Potentially vulnerable Unspecified -
Fedora 37
release
kernel 6.0.7 Potentially vulnerable Unspecified -
Fedora 37
release
kernel-headers 6.0.5 Potentially vulnerable Unspecified -
Fedora 37
release
kernel-tools 6.0.5 Potentially vulnerable Unspecified -
Fedora 37
release
usbip 5.7.9 Potentially vulnerable Unspecified -
Fedora 38
updates
kernel 6.8.9 Potentially vulnerable Unspecified -
Fedora 38
updates
kernel-headers 6.8.3 Potentially vulnerable Unspecified -
Fedora 38
updates
kernel-tools 6.6.3 Potentially vulnerable Unspecified -
Fedora 38
release
kernel 6.2.9 Potentially vulnerable Unspecified -
Fedora 38
release
kernel-headers 6.2.6 Potentially vulnerable Unspecified -
Fedora 38
release
kernel-tools 6.2.6 Potentially vulnerable Unspecified -
Fedora 38
release
usbip 5.7.9 Potentially vulnerable Unspecified -
Fedora 39
updates
kernel 6.11.9 Potentially vulnerable Unspecified -
Fedora 39
updates
kernel-headers 6.11.3 Potentially vulnerable Unspecified -
Fedora 39
updates
kernel-tools 6.6.3 Potentially vulnerable Unspecified -
Fedora 39
release
kernel 6.5.6 Potentially vulnerable Unspecified -
Fedora 39
release
kernel-headers 6.5.4 Potentially vulnerable Unspecified -
Fedora 39
release
kernel-tools 6.5.4 Potentially vulnerable Unspecified -
Fedora 39
release
usbip 5.7.9 Potentially vulnerable Unspecified -
Fedora 40
updates
kernel 6.14.5 Potentially vulnerable Unspecified -
Fedora 40
updates
kernel-headers 6.14.3 Potentially vulnerable Unspecified -
Fedora 40
release
kernel 6.8.5 Potentially vulnerable Unspecified -
Fedora 40
release
kernel-headers 6.8.3 Potentially vulnerable Unspecified -
Fedora 40
release
usbip 5.7.9 Potentially vulnerable Unspecified -
Fedora 41
updates
kernel 6.14.11 Potentially vulnerable Unspecified -
Fedora 41
updates
kernel-headers 6.14.3 Potentially vulnerable Unspecified -
Fedora 41
release
kernel 6.11.4 Potentially vulnerable Unspecified -
Fedora 41
release
kernel-headers 6.11.3 Potentially vulnerable Unspecified -
Fedora 41
release
usbip 5.7.9 Potentially vulnerable Unspecified -
Fedora 42
updates
kernel 6.14.11 Potentially vulnerable Unspecified -
Fedora 42
updates
kernel-headers 6.14.3 Potentially vulnerable Unspecified -
Fedora 42
release
kernel 6.14.0 Potentially vulnerable Unspecified -
Fedora 42
release
kernel-headers 6.14.0 Potentially vulnerable Unspecified -
Fedora 42
release
usbip 5.7.9 Potentially vulnerable Unspecified -
Fedora Rawhide
development
kernel 6.16.0-rc2 Potentially vulnerable Unspecified -
Fedora Rawhide
development
kernel-headers 6.16.0-rc2 Potentially vulnerable Unspecified -
Fedora Rawhide
development
usbip 5.7.9 Potentially vulnerable Unspecified -
FreeBSD Ports devel/evdev-proto 5.8 Potentially vulnerable devel x11@freebsd.org
FreeBSD Ports sysutils/turbostat 4.17 Potentially vulnerable sysutils ports@freebsd.org
Gentoo sys-kernel/linux-next 9999 sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.12.9999 sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.6.9999 sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.1.9999 sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 5.15.9999 sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 5.10.9999 sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/git-sources 6.16_rc2 Potentially vulnerable sys-kernel mpagano@gentoo.org, kernel@gentoo.org
Gentoo sys-kernel/git-sources 6.16_rc1 Potentially vulnerable sys-kernel mpagano@gentoo.org, kernel@gentoo.org
Gentoo sys-kernel/vanilla-sources 6.15.3 Potentially vulnerable sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.15.3 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.15.2 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo dev-util/perf 6.15 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
Gentoo sys-kernel/linux-headers 6.15 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/vanilla-sources 6.14.11 Potentially vulnerable sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.14.11 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.14.10 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.14.9 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo dev-util/perf 6.14 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
Gentoo sys-kernel/linux-headers 6.14 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 6.13 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/vanilla-sources 6.12.34 Potentially vulnerable sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.12.34 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.12.33 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.12.32 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.12.31 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/linux-headers 6.12 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 6.11 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 6.10 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-power/cpupower 6.10 Potentially vulnerable sys-power floppym@gentoo.org
Gentoo sys-kernel/linux-headers 6.9 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 6.8 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo dev-util/perf 6.7 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
Gentoo sys-kernel/vanilla-sources 6.6.94 Potentially vulnerable sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.6.94 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.6.93 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.6.92 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/linux-headers 6.6 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-power/cpupower 6.2 Potentially vulnerable sys-power floppym@gentoo.org
Gentoo sys-kernel/vanilla-sources 6.1.141 Potentially vulnerable sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.1.141 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 6.1.140 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/linux-headers 6.1 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/vanilla-sources 5.15.185 Potentially vulnerable sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 5.15.185 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 5.15.183 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/linux-headers 5.15 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo net-misc/usbip 5.15 Potentially vulnerable net-misc chithanh@gentoo.org
Gentoo sys-kernel/vanilla-sources 5.10.238 Potentially vulnerable sys-kernel kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 5.10.238 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/vanilla-kernel 5.10.237 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
Gentoo sys-kernel/linux-headers 5.10 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/vanilla-sources 5.4.294 Potentially vulnerable sys-kernel kernel@gentoo.org
Gentoo sys-kernel/linux-headers 5.4 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 4.19 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 4.14 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 4.9 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 4.4 Potentially vulnerable sys-kernel toolchain@gentoo.org
Gentoo sys-kernel/linux-headers 3.18 Potentially vulnerable sys-kernel toolchain@gentoo.org
glaucus linux-headers 6.14.4 Potentially vulnerable - -
GNU Guix perf 6.14.11 Potentially vulnerable - -
GNU Guix cpupower 6.14.11 Potentially vulnerable - -
GNU Guix tmon 6.14.11 Potentially vulnerable - -
GNU Guix turbostat 6.14.11 Potentially vulnerable - -
GNU Guix usbip-utils 6.14.11 Potentially vulnerable - -
GoboLinux Linux 6.12.16 Potentially vulnerable - -
GoboLinux Linux-Headers 6.0.19 Potentially vulnerable - -
Homebrew linux-headers@5.15 5.15.185 Potentially vulnerable - -
Homebrew linux-headers@4.4 4.4.302 Potentially vulnerable - -
Kali Linux Rolling
main
linux 6.12.25 Potentially vulnerable kernel devel@kali.org, hertzog@debian.org, sophie@offensive-security.com
KaOS
core
linux-next-docs 6.15.3 Potentially vulnerable - demm@kaosx.us
KaOS
core
linux-next-headers 6.15.3 Potentially vulnerable - demm@kaosx.us
KaOS
core
linux-next 6.15.3 Potentially vulnerable - demm@kaosx.us
KaOS
core
linux-headers 6.14.8 Potentially vulnerable - demm@kaosx.us
KaOS
core
linux-docs 6.14.8 Potentially vulnerable - demm@kaosx.us
KaOS
core
linux 6.14.8 Potentially vulnerable - demm@kaosx.us
KaOS
main
cpupower 6.14.8 Potentially vulnerable - demm@kaosx.us
KaOS
core
linux-api-headers 6.14 Potentially vulnerable - demm@kaosx.us
KISS Community - main
core
linux-headers 6.12.25 Potentially vulnerable - owen@owenrafferty.com
LiGurOS stable sys-kernel/linux-next 9999 sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.12.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.6.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.1.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.15.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.10.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/git-sources 6.15_rc4 Potentially vulnerable sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS stable sys-kernel/git-sources 6.15_rc3 Potentially vulnerable sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS stable sys-kernel/git-sources 6.15_rc2 Potentially vulnerable sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS stable sys-kernel/git-sources 6.15_rc1 Potentially vulnerable sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.14.4 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 6.14.4 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.14.3 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.14.2 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.14.1 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable dev-util/perf 6.14 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.14 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 6.13.12 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.13.12 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.13.11 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.13.10 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.13.9 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable dev-util/perf 6.13.5 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.13 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.12.25 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 6.12.25 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.12.24 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.12.23 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.12.22 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.12.21 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable dev-util/perf 6.12 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.12 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable dev-util/perf 6.11.7 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.11 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-power/cpupower 6.10 Potentially vulnerable sys-power floppym@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.10 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.9 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.8 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable dev-util/perf 6.7 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.6.88 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 6.6.88 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.6.87 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.6.86 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.6.85 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.6 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-power/cpupower 6.2 Potentially vulnerable sys-power floppym@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.1.135 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 6.1.135 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.1.134 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.1.133 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 6.1.132 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/linux-headers 6.1 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 5.15.180 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.15.180 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.15.179 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.15.178 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/linux-headers 5.15 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable net-misc/usbip 5.15 Potentially vulnerable net-misc chithanh@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.10.236 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 5.10.236 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.10.235 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/vanilla-kernel 5.10.234 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS stable sys-kernel/linux-headers 5.10 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/vanilla-sources 5.4.292 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS stable sys-kernel/linux-headers 5.4 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 4.19 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 4.14 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 4.9 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 4.4 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS stable sys-kernel/linux-headers 3.18 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-next 9999 sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.12.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.6.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.1.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 5.15.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 5.10.9999 sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/git-sources 6.16_rc2 Potentially vulnerable sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS develop sys-kernel/git-sources 6.16_rc1 Potentially vulnerable sys-kernel mpagano@gentoo.org, kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.15.3 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 6.15.3 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.15.2 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.15 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop dev-util/perf 6.15 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.14.11 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 6.14.11 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.14.10 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.14.9 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.14 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop dev-util/perf 6.14 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.13 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.12.34 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 6.12.34 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.12.33 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.12.32 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.12.31 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.12 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.11 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.10 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-power/cpupower 6.10 Potentially vulnerable sys-power floppym@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.9 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.8 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop dev-util/perf 6.7 Potentially vulnerable dev-util amadio@gentoo.org, naota@gentoo.org, dlan@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.6.94 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 6.6.94 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.6.93 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.6.92 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.6 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-power/cpupower 6.2 Potentially vulnerable sys-power floppym@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.1.141 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 6.1.141 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 6.1.140 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/linux-headers 6.1 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 5.15.185 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 5.15.185 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 5.15.183 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/linux-headers 5.15 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop net-misc/usbip 5.15 Potentially vulnerable net-misc chithanh@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 5.10.238 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 5.10.238 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/vanilla-kernel 5.10.237 Potentially vulnerable sys-kernel dist-kernel@gentoo.org
LiGurOS develop sys-kernel/linux-headers 5.10 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/vanilla-sources 5.4.294 Potentially vulnerable sys-kernel kernel@gentoo.org
LiGurOS develop sys-kernel/linux-headers 5.4 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 4.19 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 4.14 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 4.9 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 4.4 Potentially vulnerable sys-kernel toolchain@gentoo.org
LiGurOS develop sys-kernel/linux-headers 3.18 Potentially vulnerable sys-kernel toolchain@gentoo.org
Mageia 8
core/backports
kernel 6.1.45 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 6.1.41 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 6.1.38 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 6.1.34 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 6.1.27 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 6.1.23 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 6.1.15 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 6.1.6 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 6.0.12 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 6.0.9 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.19.16 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.19.7 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.19.3 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.18.15 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.18.12 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.18.7 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.18.3 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.17.11 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.17.9 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.17.4 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.16.18 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.16.14 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.16.12 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.16.10 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.126 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.126 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.122 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.122 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.120 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.120 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.117 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.117 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.110 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.110 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.106 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.106 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.98 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.98 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.88 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.88 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.82 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.82 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.79 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.79 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.74 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.74 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.65 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.62 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.62 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.58 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.58 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.55 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.55 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.50 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.50 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.46 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.46 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.43 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.43 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.41 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.41 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.35 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.35 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.32 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.32 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.28 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.28 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.26 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.25 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.23 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.23 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.18 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.18 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.16 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.16 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.15 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.15 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.11 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.11 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.10 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.10 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.6 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.6 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.15.4 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.15.4 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.14.17 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.14.14 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.14.10 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.13.14 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.13.12 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.13.8 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.13.4 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.12.15 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.12.13 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.12.12 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.12.10 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.12.8 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.12.6 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/backports
kernel 5.12.4 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.78 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.78 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.75 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.75 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.70 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.70 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.62 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.62 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.60 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.60 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.56 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.56 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.52 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.52 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.48 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.48 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.46 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.46 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.45 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.45 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.43 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.43 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.41 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.41 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.37 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.37 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.33 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.33 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.30 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.30 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.27 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.27 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.25 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.25 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.20 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel 5.10.19 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/updates
kernel-linus 5.10.19 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/release
kernel 5.10.16 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/release
kernel-linus 5.10.16 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.93 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.93 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.88 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.88 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.83 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.83 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.79 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.79 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.74 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.74 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.65 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.65 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.61 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.61 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.58 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.58 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.52 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.52 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.50 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.50 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.43 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.43 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.37 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.37 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.28 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.28 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.22 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.22 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.18 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.18 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.6.14 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.6.14 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.5.13 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.5.13 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.5.11 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.5.11 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel 6.4.16 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/updates
kernel-linus 6.4.16 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/release
kernel 6.4.9 Potentially vulnerable System/Kernel and hardware -
Mageia 9
core/release
kernel-linus 6.4.9 Potentially vulnerable System/Kernel and hardware -
Mageia cauldron
core/release
kernel 6.12.33 Potentially vulnerable System/Kernel and hardware -
Mageia cauldron
core/release
kernel-lts 6.6.92 Potentially vulnerable System/Kernel and hardware -
Mageia cauldron
core/release
kernel-linus 6.6.87 Potentially vulnerable System/Kernel and hardware -
Manjaro Stable
core
linux615 6.15.0rc6 Potentially vulnerable - -
Manjaro Stable
core
linux615-headers 6.15.0rc6 Potentially vulnerable - -
Manjaro Stable
core
linux614-headers 6.14.6 Potentially vulnerable - -
Manjaro Stable
core
linux614 6.14.6 Potentially vulnerable - -
Manjaro Stable
core
linux-api-headers 6.14 Potentially vulnerable - -
Manjaro Stable
extra
hyperv 6.14 Potentially vulnerable - -
Manjaro Stable
extra
bpf 6.14 Potentially vulnerable - -
Manjaro Stable
extra
cpupower 6.14 Potentially vulnerable - -
Manjaro Stable
extra
tmon 6.14 Potentially vulnerable - -
Manjaro Stable
extra
perf 6.14 Potentially vulnerable - -
Manjaro Stable
extra
bootconfig 6.14 Potentially vulnerable - -
Manjaro Stable
extra
x86_energy_perf_policy 6.14 Potentially vulnerable - -
Manjaro Stable
extra
intel-speed-select 6.14 Potentially vulnerable - -
Manjaro Stable
extra
usbip 6.14 Potentially vulnerable - -
Manjaro Stable
extra
kcpuid 6.14 Potentially vulnerable - -
Manjaro Stable
extra
linux-tools-meta 6.14 Potentially vulnerable - -
Manjaro Stable
extra
turbostat 6.14 Potentially vulnerable - -
Manjaro Stable
core
linux612-headers 6.12.28 Potentially vulnerable - -
Manjaro Stable
core
linux612 6.12.28 Potentially vulnerable - -
Manjaro Stable
core
linux66-headers 6.6.90 Potentially vulnerable - -
Manjaro Stable
core
linux66 6.6.90 Potentially vulnerable - -
Manjaro Stable
core
linux61-headers 6.1.138 Potentially vulnerable - -
Manjaro Stable
core
linux61 6.1.138 Potentially vulnerable - -
Manjaro Stable
core
linux515-headers 5.15.182 Potentially vulnerable - -
Manjaro Stable
core
linux515 5.15.182 Potentially vulnerable - -
Manjaro Stable
core
linux510 5.10.237 Potentially vulnerable - -
Manjaro Stable
core
linux510-headers 5.10.237 Potentially vulnerable - -
Manjaro Stable
core
linux54-headers 5.4.293 Potentially vulnerable - -
Manjaro Stable
core
linux54 5.4.293 Potentially vulnerable - -
Manjaro Testing
core
linux616-headers 6.16.0rc2 Potentially vulnerable - -
Manjaro Testing
core
linux616 6.16.0rc2 Potentially vulnerable - -
Manjaro Testing
core
linux615-headers 6.15.3 Potentially vulnerable - -
Manjaro Testing
core
linux615 6.15.3 Potentially vulnerable - -
Manjaro Testing
extra
bpf 6.15 Potentially vulnerable - -
Manjaro Testing
extra
cpupower 6.15 Potentially vulnerable - -
Manjaro Testing
extra
linux-tools-meta 6.15 Potentially vulnerable - -
Manjaro Testing
extra
kcpuid 6.15 Potentially vulnerable - -
Manjaro Testing
extra
tmon 6.15 Potentially vulnerable - -
Manjaro Testing
extra
turbostat 6.15 Potentially vulnerable - -
Manjaro Testing
extra
x86_energy_perf_policy 6.15 Potentially vulnerable - -
Manjaro Testing
extra
perf 6.15 Potentially vulnerable - -
Manjaro Testing
extra
intel-speed-select 6.15 Potentially vulnerable - -
Manjaro Testing
extra
usbip 6.15 Potentially vulnerable - -
Manjaro Testing
extra
bootconfig 6.15 Potentially vulnerable - -
Manjaro Testing
extra
hyperv 6.15 Potentially vulnerable - -
Manjaro Testing
core
linux-api-headers 6.15 Potentially vulnerable - -
Manjaro Testing
core
linux612-headers 6.12.34 Potentially vulnerable - -
Manjaro Testing
core
linux612 6.12.34 Potentially vulnerable - -
Manjaro Testing
core
linux66 6.6.94 Potentially vulnerable - -
Manjaro Testing
core
linux66-headers 6.6.94 Potentially vulnerable - -
Manjaro Testing
core
linux61-headers 6.1.141 Potentially vulnerable - -
Manjaro Testing
core
linux61 6.1.141 Potentially vulnerable - -
Manjaro Testing
core
linux515-headers 5.15.185 Potentially vulnerable - -
Manjaro Testing
core
linux515 5.15.185 Potentially vulnerable - -
Manjaro Testing
core
linux510-headers 5.10.237 Potentially vulnerable - -
Manjaro Testing
core
linux510 5.10.237 Potentially vulnerable - -
Manjaro Testing
core
linux54 5.4.294 Potentially vulnerable - -
Manjaro Testing
core
linux54-headers 5.4.294 Potentially vulnerable - -
Manjaro Unstable
core
linux616 6.16.0rc2 Potentially vulnerable - -
Manjaro Unstable
core
linux616-headers 6.16.0rc2 Potentially vulnerable - -
Manjaro Unstable
core
linux615 6.15.3 Potentially vulnerable - -
Manjaro Unstable
core
linux615-headers 6.15.3 Potentially vulnerable - -
Manjaro Unstable
core
linux-api-headers 6.15 Potentially vulnerable - -
Manjaro Unstable
extra
turbostat 6.15 Potentially vulnerable - -
Manjaro Unstable
extra
bootconfig 6.15 Potentially vulnerable - -
Manjaro Unstable
extra
perf 6.15 Potentially vulnerable - -
Manjaro Unstable
extra
x86_energy_perf_policy 6.15 Potentially vulnerable - -
Manjaro Unstable
extra
linux-tools-meta 6.15 Potentially vulnerable - -
Manjaro Unstable
extra
kcpuid 6.15 Potentially vulnerable - -
Manjaro Unstable
extra
bpf 6.15 Potentially vulnerable - -
Manjaro Unstable
extra
intel-speed-select 6.15 Potentially vulnerable - -
Manjaro Unstable
extra
tmon 6.15 Potentially vulnerable - -
Manjaro Unstable
extra
hyperv 6.15 Potentially vulnerable - -
Manjaro Unstable
extra
cpupower 6.15 Potentially vulnerable - -
Manjaro Unstable
extra
usbip 6.15 Potentially vulnerable - -
Manjaro Unstable
core
linux612-headers 6.12.34 Potentially vulnerable - -
Manjaro Unstable
core
linux612 6.12.34 Potentially vulnerable - -
Manjaro Unstable
core
linux66 6.6.94 Potentially vulnerable - -
Manjaro Unstable
core
linux66-headers 6.6.94 Potentially vulnerable - -
Manjaro Unstable
core
linux61-headers 6.1.141 Potentially vulnerable - -
Manjaro Unstable
core
linux61 6.1.141 Potentially vulnerable - -
Manjaro Unstable
core
linux515 5.15.185 Potentially vulnerable - -
Manjaro Unstable
core
linux515-headers 5.15.185 Potentially vulnerable - -
Manjaro Unstable
core
linux510-headers 5.10.237 Potentially vulnerable - -
Manjaro Unstable
core
linux510 5.10.237 Potentially vulnerable - -
Manjaro Unstable
core
linux54 5.4.294 Potentially vulnerable - -
Manjaro Unstable
core
linux54-headers 5.4.294 Potentially vulnerable - -
MidnightBSD mports devel/evdev-proto 5.3 Potentially vulnerable devel -
MX Linux MX-19
ahs
linux 6.0.12 Potentially vulnerable kernel stevep@mxlinux.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
MX Linux MX-19
main
linux 5.15.2 Potentially vulnerable kernel stevep@mxlinux.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
MX Linux MX-21
ahs
linux 6.5.13 Potentially vulnerable kernel stevep@mxlinux.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
MX Linux MX-21
main
linux 5.15.2 Potentially vulnerable kernel stevep@mxlinux.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
MX Linux MX-23
ahs
linux 6.12.32 Potentially vulnerable kernel stevep@mxlinux.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
nixpkgs stable 22.11 linux 6.3.10 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 6.3.10 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 6.3.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 tmon 6.3.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 6.3.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 6.3.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 6.3.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 6.3.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 6.3.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 6.3.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 6.3.9 Potentially vulnerable linuxKernel meurerbernardo@gmail.com, shawn8901@googlemail.com, lythe1107@gmail.com, atemu.main+nixpkgs@gmail.com
nixpkgs stable 22.11 tmon 6.3.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 tmon 6.3.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 6.3.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 6.3.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 6.3.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 6.3.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 6.3.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 6.3.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 6.3.1 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 6.3.1 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 6.3.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 6.3.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 6.3.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 6.3.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 6.1.36 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 6.1.36 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 6.1.36 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 6.1.36 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 6.1.36 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 6.1.35 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 6.1.35 Potentially vulnerable linuxKernel meurerbernardo@gmail.com, shawn8901@googlemail.com, lythe1107@gmail.com, atemu.main+nixpkgs@gmail.com
nixpkgs stable 22.11 linux 6.1.35 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 6.1.35 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 tmon 6.1.35 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 6.1.35 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 6.1.35 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 6.1.35 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 6.1.35 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 6.1.35 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 6.1.35 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 6.0.10 Potentially vulnerable linuxKernel andre.beat@gmail.com, root@pedrohlc.com
nixpkgs stable 22.11 linux 6.0.10 Potentially vulnerable linuxKernel andre.beat@gmail.com, root@pedrohlc.com
nixpkgs stable 22.11 tmon 6.0.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 tmon 6.0.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 6.0.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 6.0.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 6.0.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 6.0.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 6.0.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 6.0.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 evdev-proto 6.0 Potentially vulnerable - hi@alyssa.is
nixpkgs stable 22.11 linux-headers 6.0 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 22.11 linux-headers 5.19.16 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 22.11 bpftools 5.19.12 Potentially vulnerable - aseipp@pobox.com
nixpkgs stable 22.11 linux 5.15.119 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 5.15.119 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 5.15.119 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 5.15.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 tmon 5.15.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 5.15.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 5.15.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 5.15.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 5.15.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 5.15.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 5.15.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 5.15.118 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 5.15.118 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 5.15.118 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 5.15.118 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 5.15.118 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 tmon 5.15.118 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 5.15.118 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 5.15.118 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 5.15.118 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 5.15.118 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 5.15.118 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 5.15.118 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 5.15.74-1.20221028 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 5.15.74-1.20221028 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 5.15.74-1.20221028 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 5.15.74-1.20221028 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 5.10.186 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 5.10.186 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 5.10.186 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 5.10.186 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 5.10.186 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 5.10.185 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 5.10.185 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 5.10.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 5.10.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 5.10.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 5.10.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 5.10.184-rt90 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 5.4.249 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 5.4.249 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 5.4.249 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 5.4.249 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 5.4.249 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 5.4.248 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 5.4.248 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 5.4.248 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 5.4.248 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 5.4.248 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 5.4.248 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 5.4.242-rt81 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 4.19.288 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 4.19.288 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 4.19.288 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 4.19.288 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 4.19.288 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 4.19.287 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 4.19.287 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 4.19.287 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 4.19.287 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 4.19.287 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 4.19.287 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 4.14.320 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 4.14.320 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 4.14.320 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 4.14.320 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 4.14.320 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 4.14.319 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 linux 4.14.319 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 4.14.319 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 4.14.319 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 4.14.319 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 4.14.319 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 linux 4.14.180-176 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 22.11 tmon 4.14.180-176 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 turbostat 4.14.180-176 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 usbip-linux 4.14.180-176 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 22.11 cpupower 4.14.180-176 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 6.7-rc7 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 6.6.8 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 6.6.8 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 6.6.8 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 cpupower 6.6.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 6.6.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.6.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.6.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 cpupower 6.6.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 6.6.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.6.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.6.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 cpupower 6.6.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 6.6.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.6.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.6.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 cpupower 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 6.5.13 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 6.5.13 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 cpupower 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 6.5.12 Potentially vulnerable linuxKernel meurerbernardo@gmail.com, shawn8901@googlemail.com, lythe1107@gmail.com, atemu.main+nixpkgs@gmail.com
nixpkgs stable 23.05 cpupower 6.5.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 6.5.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.5.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.5.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 cpupower 6.5.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 6.5.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.5.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.5.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 6.4.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 cpupower 6.4.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 6.4.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.4.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.4.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 6.3.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 cpupower 6.3.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 6.3.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.3.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.3.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 bpftools 6.2 Potentially vulnerable - aseipp@pobox.com
nixpkgs stable 23.05 linux-headers 6.2 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 23.05 evdev-proto 6.2 Potentially vulnerable - hi@alyssa.is
nixpkgs stable 23.05 linux 6.1.69 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 6.1.69 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 6.1.69 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 6.1.69 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 cpupower 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 cpupower 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 cpupower 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 cpupower 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.1.69 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 6.1.69 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 6.1.67-rt20 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 tmon 6.1.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 6.1.63 Potentially vulnerable linuxKernel meurerbernardo@gmail.com, shawn8901@googlemail.com, lythe1107@gmail.com, atemu.main+nixpkgs@gmail.com
nixpkgs stable 23.05 cpupower 6.1.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.1.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.1.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 6.1.21-1.20230405 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 6.1.21-1.20230405 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 6.1.21-1.20230405 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 6.1.21-1.20230405 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 6.1.3-bcachefs-unstable-2023-02-01 Potentially vulnerable linuxKernel madouura@gmail.com, post@davidak.de, root@pedrohlc.com
nixpkgs stable 23.05 cpupower 6.1.3-bcachefs-unstable-2023-02-01 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 6.1.3-bcachefs-unstable-2023-02-01 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 6.1.3-bcachefs-unstable-2023-02-01 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 6.1.3-bcachefs-unstable-2023-02-01 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux-headers 5.19.16 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 5.15.145 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 5.15.145 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 cpupower 5.15.145 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 5.15.145 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 5.15.145 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 5.15.145 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 cpupower 5.15.145 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 5.15.145 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 5.15.145 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 5.15.145 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 5.15.141-rt72 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 5.10.205 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 5.10.205 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 cpupower 5.10.205 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 5.10.205 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 5.10.205 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 5.10.205 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 cpupower 5.10.205 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 5.10.205 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 5.10.205 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 5.10.205 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 5.10.204-rt100 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 5.4.265 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 5.4.265 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 cpupower 5.4.265 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 5.4.265 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 5.4.265 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 5.4.265 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 cpupower 5.4.265 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 5.4.265 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 5.4.265 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 5.4.265 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 5.4.257-rt87 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 4.19.303 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 linux 4.19.303 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 cpupower 4.19.303 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 4.19.303 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 4.19.303 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 4.19.303 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 cpupower 4.19.303 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 4.19.303 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 4.19.303 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 4.19.303 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 4.14.334 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 cpupower 4.14.334 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 4.14.334 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 4.14.334 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 4.14.334 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 4.14.333 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 cpupower 4.14.333 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 4.14.333 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 4.14.333 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 4.14.333 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 linux 4.14.180-176 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.05 cpupower 4.14.180-176 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 tmon 4.14.180-176 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 turbostat 4.14.180-176 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.05 usbip-linux 4.14.180-176 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.10-rc5 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.9.7 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.9.7 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.9.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.9.4 Potentially vulnerable linuxKernel me@zzzsy.top, lythe1107@gmail.com, shawn8901@googlemail.com, meurerbernardo@gmail.com, atemu.main+nixpkgs@gmail.com
nixpkgs stable 23.11 cpupower 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.9.4 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.9.2 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.9.2 Potentially vulnerable linuxKernel thiagokokada@gmail.com, jerry.starke@icloud.com
nixpkgs stable 23.11 cpupower 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.9.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.8.12 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 6.8.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.8.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.8.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.8.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.8.11 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.8.11 Potentially vulnerable linuxKernel thiagokokada@gmail.com, jerry.starke@icloud.com
nixpkgs stable 23.11 cpupower 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.8.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.6.36 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 6.6.36 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.6.36 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.6.36 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.6.36 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.6.35-rt34 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.6.33 Potentially vulnerable linuxKernel me@zzzsy.top, lythe1107@gmail.com, shawn8901@googlemail.com, meurerbernardo@gmail.com, atemu.main+nixpkgs@gmail.com
nixpkgs stable 23.11 cpupower 6.6.33 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.6.33 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.6.33 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.6.33 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.6.32 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 6.6.32 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.6.32 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.6.32 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.6.32 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.5.13-bcachefs-unstable-2023-06-28 Potentially vulnerable linuxKernel madouura@gmail.com, ryan@lahfa.xyz, post@davidak.de, daniel@gluo.nz, root@pedrohlc.com
nixpkgs stable 23.11 cpupower 6.5.13-bcachefs-unstable-2023-06-28 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.5.13-bcachefs-unstable-2023-06-28 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.5.13-bcachefs-unstable-2023-06-28 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.5.13-bcachefs-unstable-2023-06-28 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.5.13 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.5.13 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.5.13 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 bpftools 6.5 Potentially vulnerable - aseipp@pobox.com
nixpkgs stable 23.11 linux-headers 6.5 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 23.11 evdev-proto 6.5 Potentially vulnerable - hi@alyssa.is
nixpkgs stable 23.11 cpupower 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.1.96 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.1.96 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.1.96 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.1.96 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.1.95-rt34 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.1.92 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.1.92 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 cpupower 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 6.1.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 6.1.21-1.20230405 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.1.21-1.20230405 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.1.21-1.20230405 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 6.1.21-1.20230405 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 5.15.161 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 5.15.161 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 5.15.161 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 5.15.161 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 5.15.161 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.15.160 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 5.15.160 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 5.15.160 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 5.15.160 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 5.15.160 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.15.160-rt77 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 5.10.220 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 5.10.220 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 5.10.220 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 5.10.220 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 5.10.220 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.10.218 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 5.10.218 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 5.10.218 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 5.10.218 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 5.10.218 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.10.218-rt110 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 5.4.278 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 5.4.278 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 5.4.278 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 5.4.278 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 5.4.278 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.4.277 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 5.4.277 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 5.4.277 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 5.4.277 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 5.4.277 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 5.4.271-rt89 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 linux 4.19.316 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 4.19.316 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 4.19.316 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 4.19.316 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 4.19.316 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 linux 4.19.315 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 23.11 cpupower 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 tmon 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 turbostat 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 23.11 usbip-linux 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.13-rc4 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.12.7 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.12.7 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.12.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.12.6 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.12.6 Potentially vulnerable linuxKernel me@zzzsy.top, lythe1107@gmail.com, shawn8901@googlemail.com, meurerbernardo@gmail.com, nixpkgs@mail.atemu.net
nixpkgs stable 24.05 linux 6.11.11 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 6.11.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.11.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.11.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.11.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.11.10 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 6.11.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.11.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.11.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.11.10 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.10.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.10.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.10.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.10.1 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.10.1 Potentially vulnerable linuxKernel thiagokokada@gmail.com, jerry.starke@icloud.com
nixpkgs stable 24.05 linux 6.9.11 Potentially vulnerable linuxKernel thiagokokada@gmail.com, jerry.starke@icloud.com
nixpkgs stable 24.05 cpupower 6.9.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.9.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.9.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.9.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 evdev-proto 6.7 Potentially vulnerable - hi@alyssa.is
nixpkgs stable 24.05 linux-headers 6.7 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 24.05 bpftools 6.7 Potentially vulnerable - aseipp@pobox.com
nixpkgs stable 24.05 linux 6.6.68 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.6.68 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.6.68 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.6.68 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.6.67 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.6.67 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.6.67 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.6.67 Potentially vulnerable linuxKernel me@zzzsy.top, lythe1107@gmail.com, shawn8901@googlemail.com, meurerbernardo@gmail.com, nixpkgs@mail.atemu.net
nixpkgs stable 24.05 cpupower 6.6.67 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.6.63 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.6.63 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 cpupower 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.6.63 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.6.63-rt46 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.1.122 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 6.1.122 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.1.122 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.1.122 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.1.122 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.1.119 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 6.1.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 6.1.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 6.1.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 6.1.119 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 6.1.119-rt45 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.1.63-stable_20231123 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.1.63-stable_20231123 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.1.63-stable_20231123 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 linux 6.1.63-stable_20231123 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 linux 5.15.175 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 5.15.175 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 5.15.175 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 5.15.175 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 5.15.175 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.15.173 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 5.15.173 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 5.15.173 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 5.15.173 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 5.15.173 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.15.170-rt81 Potentially vulnerable - tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 linux 5.10.232 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 5.10.232 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 5.10.232 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 5.10.232 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 5.10.232 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.10.230 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 5.10.230 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 5.10.230 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 5.10.230 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 5.10.230 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.10.229-rt121 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 linux 5.4.288 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 5.4.288 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 5.4.288 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 5.4.288 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 5.4.288 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.4.286 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 5.4.286 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 5.4.286 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 5.4.286 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 5.4.286 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 5.4.285-rt93 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 linux 4.19.322 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 4.19.322 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 4.19.322 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 4.19.322 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 4.19.322 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 linux 4.19.315 Potentially vulnerable linuxKernel tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.05 cpupower 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 tmon 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 turbostat 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.05 usbip-linux 4.19.315 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 6.16-rc2 Potentially vulnerable linuxKernel me@0upti.me, tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.11 turbostat 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 6.15.2 Potentially vulnerable linuxKernel me@0upti.me, tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.11 cpupower 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 6.14.11 Potentially vulnerable linuxKernel me@0upti.me, tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.11 cpupower 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 6.13.12 Potentially vulnerable linuxKernel me@0upti.me, tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.11 cpupower 6.13.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.13.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.13.7 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.12.33 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.12.33 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.12.33 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 6.12.33 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 6.12.33 Potentially vulnerable linuxKernel me@0upti.me, tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.11 cpupower 6.12.31 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.12.31 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.12.31 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.12.19 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.12.19 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.12.19 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux-headers 6.10 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 24.11 bpftools 6.10 Potentially vulnerable - aseipp@pobox.com
nixpkgs stable 24.11 evdev-proto 6.10 Potentially vulnerable - hi@alyssa.is
nixpkgs stable 24.11 cpupower 6.6.93 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.6.93 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.6.93 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 6.6.93 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.6.93 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.6.93 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.6.93 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 6.6.93 Potentially vulnerable - me@0upti.me, tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.11 linux 6.6.93 Potentially vulnerable - me@0upti.me, tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.11 cpupower 6.6.83 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.6.83 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.6.83 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.6.83 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.6.83 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.6.83 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 6.1.141 Potentially vulnerable linuxKernel me@0upti.me, tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.11 cpupower 6.1.131 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 6.1.131 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 6.1.131 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 5.15.185 Potentially vulnerable linuxKernel me@0upti.me, tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.11 cpupower 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 5.15.179 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 5.15.179 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 5.15.179 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 5.10.238 Potentially vulnerable linuxKernel me@0upti.me, tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.11 cpupower 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 5.10.235 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 5.10.235 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 5.10.235 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 linux 5.4.294 Potentially vulnerable linuxKernel me@0upti.me, tim@nequissimus.com, tredwell@tutanota.com, hi@alyssa.is, maximilian@mbosch.me, aseipp@pobox.com
nixpkgs stable 24.11 cpupower 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 usbip-linux 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 cpupower 5.4.291 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 tmon 5.4.291 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 24.11 turbostat 5.4.291 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 6.16-rc2 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs stable 25.05 linux 6.15.3 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs stable 25.05 cpupower 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 6.14.11 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs stable 25.05 cpupower 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.14.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.14.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.14.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 6.13.12 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs stable 25.05 linux 6.13.12 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs stable 25.05 cpupower 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 6.12.34 Potentially vulnerable - aseipp@pobox.com
nixpkgs stable 25.05 cpupower 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 6.12.34 Potentially vulnerable - aseipp@pobox.com
nixpkgs stable 25.05 cpupower 6.12.31 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.12.31 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.12.31 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.12.30 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.12.30 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.12.30 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.12.30 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.12.30 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.12.30 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 evdev-proto 6.12.7 Potentially vulnerable - hi@alyssa.is
nixpkgs stable 25.05 bpftools 6.12.7 Potentially vulnerable - aseipp@pobox.com
nixpkgs stable 25.05 linux-headers 6.12.7 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 6.6.94 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs stable 25.05 cpupower 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.6.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.6.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.6.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 6.1.141 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs stable 25.05 cpupower 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 6.1.140 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 6.1.140 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 6.1.140 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 5.15.185 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs stable 25.05 cpupower 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 5.15.184 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 5.15.184 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 5.15.184 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 5.10.238 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs stable 25.05 cpupower 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 5.10.237 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 5.10.237 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 5.10.237 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 linux 5.4.294 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs stable 25.05 cpupower 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 usbip-linux 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 cpupower 5.4.293 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 tmon 5.4.293 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs stable 25.05 turbostat 5.4.293 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 6.16-rc2 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs unstable linux 6.15.3 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs unstable cpupower 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.15.3 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.15.2 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 6.14.11 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs unstable cpupower 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 6.14.11 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.14.9 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.14.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.14.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.14.8 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable bpftools 6.14.7 Potentially vulnerable - aseipp@pobox.com
nixpkgs unstable linux-headers 6.14.7 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable evdev-proto 6.14.7 Potentially vulnerable - hi@alyssa.is
nixpkgs unstable linux 6.13.12 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs unstable linux 6.13.12 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs unstable cpupower 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 6.13.12 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 6.12.34 Potentially vulnerable - aseipp@pobox.com
nixpkgs unstable cpupower 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.12.34 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 6.12.34 Potentially vulnerable - aseipp@pobox.com
nixpkgs unstable cpupower 6.12.31 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.12.31 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.12.31 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.12.30 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.12.30 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.12.30 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.12.30 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.12.30 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.12.30 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 6.6.94 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs unstable cpupower 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 6.6.94 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.6.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.6.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.6.92 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 6.1.141 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs unstable cpupower 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 6.1.141 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 6.1.140 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 6.1.140 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 6.1.140 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 5.15.185 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs unstable cpupower 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 5.15.185 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 5.15.184 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 5.15.184 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 5.15.184 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 5.10.238 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs unstable cpupower 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 5.10.238 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 5.10.237 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 5.10.237 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 5.10.237 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable linux 5.4.294 Potentially vulnerable linuxKernel aseipp@pobox.com
nixpkgs unstable cpupower 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable usbip-linux 5.4.294 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable cpupower 5.4.293 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable tmon 5.4.293 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
nixpkgs unstable turbostat 5.4.293 Potentially vulnerable linuxKernel fallback-mnt-nix@repology
NOIR Linux Main
core
linux-headers 6.7.7 Potentially vulnerable - mmatongo_@hotmail.com
openEuler 20.03-LTS-SP3 kernel 4.19.90 Potentially vulnerable Unspecified -
openEuler 20.03-LTS-SP4 kernel 4.19.90 Potentially vulnerable Unspecified -
openEuler 22.03-LTS kernel 5.10.0 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP1 kernel 5.10.0 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP2 kernel 5.10.0 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP3 kernel 5.10.0 Potentially vulnerable Unspecified -
openEuler 22.03-LTS-SP4 kernel 5.10.0 Potentially vulnerable Unspecified -
openEuler 23.03 kernel 6.1.19 Potentially vulnerable Unspecified -
openEuler 23.09 kernel 6.4.0 Potentially vulnerable Unspecified -
openEuler 24.03-LTS kernel 6.6.0 Potentially vulnerable Unspecified -
openEuler 24.03-LTS-SP1 kernel 6.6.0 Potentially vulnerable Unspecified -
openEuler 24.09 kernel 6.6.0 Potentially vulnerable Unspecified -
openEuler 25.03 kernel 6.6.0 Potentially vulnerable Unspecified -
openmamba
devel-makedist
linux-tools 6.15.3 Potentially vulnerable System/Kernel and Hardware silvan.calarco@mambasoft.it
openmamba
base
linux-tools 6.14.8 Potentially vulnerable System/Kernel and Hardware silvan.calarco@mambasoft.it
openmamba
base
kernel 6.12.30 Potentially vulnerable System/Kernel and Hardware silvan.calarco@mambasoft.it
OpenMandriva 4.3
main/updates
kernel-release 5.16.13 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 4.3
main/release
kernel-release 5.16.7 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 4.3
main/release
kernel-release 5.16.3 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 4.3
main/release
kernel-rc 5.16.0-rc8 Potentially vulnerable System/Kernel and hardware tpgxyz@gmail.com
OpenMandriva 5.0
main/release
kernel-rc 6.7.0-rc2 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 5.0
main/release
kernel 6.6.2 Potentially vulnerable System/Kernel and hardware rugyada@gmail.com
OpenMandriva 5.0
main/release
kernel5.15 5.15.109 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 6.0
main/release
kernel-rc 6.15.0-rc2 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 6.0
main/release
kernel 6.14.2 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 6.0
main/release
kernel5.15 5.15.109 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva Rolling
main/release
kernel-rc 6.15.0-rc2 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva Rolling
main/release
kernel 6.14.2 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva Rolling
main/release
kernel5.15 5.15.109 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva Cooker
main/release
kernel 6.15.2 Potentially vulnerable System/Kernel and hardware rugyada@gmail.com
OpenMandriva Cooker
main/release
kernel-rc 6.15.0-rc5 Potentially vulnerable System/Kernel and hardware rugyada@gmail.com
OpenMandriva Cooker
main/release
kernel5.15 5.15.109 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
main/oss
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
updates/sle
perf 5.14.21 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.4
updates/sle
perf 5.14.21 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.4
updates/sle
perf 5.14.21 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.4
updates/sle
perf 5.14.21 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.4
main/oss
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
main/oss
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
main/oss
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
main/oss
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
main/oss
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
main/oss
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.4
main/oss
perf 5.14.21 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.4
updates/sle
cpupower 5.14 Potentially vulnerable System/Base -
openSUSE Leap 15.4
main/oss
cpupower 5.14 Potentially vulnerable System/Base -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-debug 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-default 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-kvmsmall 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
main/oss
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
main/oss
linux32 1.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
main/oss
tmon 1.0.gb61442df748f06e9 Potentially vulnerable System/Base -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
perf 5.14.21 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.5
main/oss
perf 5.14.21 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.5
main/oss
kernel-debug 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
kernel-default 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
kernel-docs 5.14.21 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.5
main/oss
kernel-kvmsmall 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
kernel-source 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
main/oss
kernel-syms 5.14.21 Potentially vulnerable Development/Sources -
openSUSE Leap 15.5
updates/sle
cpupower 5.14 Potentially vulnerable System/Base -
openSUSE Leap 15.5
updates/sle
cpupower 5.14 Potentially vulnerable System/Base -
openSUSE Leap 15.5
main/oss
cpupower 5.14 Potentially vulnerable System/Base -
openSUSE Leap 15.5
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
updates/sle
kernel-vanilla 4.12.14 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
linux32 1.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
tmon 1.0.gb61442df748f06e9 Potentially vulnerable System/Base -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
cpupower 6.4.0 Potentially vulnerable System/Base -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
main/oss
cpupower 6.4.0 Potentially vulnerable System/Base -
openSUSE Leap 15.6
main/oss
kernel-debug 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
main/oss
kernel-default 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
main/oss
kernel-default-base 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
main/oss
kernel-docs 6.4.0 Potentially vulnerable Documentation/Man -
openSUSE Leap 15.6
main/oss
kernel-kvmsmall 6.4.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
main/oss
kernel-source 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
main/oss
kernel-syms 6.4.0 Potentially vulnerable Development/Sources -
openSUSE Leap 15.6
updates/sle
perf 6.4.0.git33229.a3afe13a7f Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.6
updates/sle
perf 6.4.0.git26920.4570763476 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.6
updates/sle
perf 6.4.0.git26920.4570763476 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.6
updates/sle
perf 6.4.0.git25687.7bc1e4ff37 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.6
updates/sle
perf 6.4.0.git22305.596cd3fdbd Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.6
main/oss
perf 6.4.0.git19721.c2fa164e2b Potentially vulnerable Development/Tools/Debuggers -
openSUSE Leap 15.6
main/oss
kernel-default-base 5.14.21 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
main/oss
linux32 1.0 Potentially vulnerable System/Kernel -
openSUSE Leap 15.6
main/oss
tmon 1.0.gb61442df748f06e9 Potentially vulnerable System/Base -
openSUSE Tumbleweed
src-oss
cpupower 6.15.2 Potentially vulnerable System/Base -
openSUSE Tumbleweed
src-oss
kernel-default 6.15.2 Potentially vulnerable System/Kernel -
openSUSE Tumbleweed
src-oss
kernel-default-base 6.15.2 Potentially vulnerable System/Kernel -
openSUSE Tumbleweed
src-oss
kernel-docs 6.15.2 Potentially vulnerable Documentation/Man -
openSUSE Tumbleweed
src-oss
kernel-kvmsmall 6.15.2 Potentially vulnerable System/Kernel -
openSUSE Tumbleweed
src-oss
kernel-source 6.15.2 Potentially vulnerable Development/Sources -
openSUSE Tumbleweed
src-oss
kernel-syms 6.15.2 Potentially vulnerable Development/Sources -
openSUSE Tumbleweed
src-oss
kernel-vanilla 6.15.2 Potentially vulnerable System/Kernel -
openSUSE Tumbleweed
src-oss
perf 6.15.2 Potentially vulnerable Development/Tools/Debuggers -
openSUSE Tumbleweed
src-oss
linux32 1.0 Potentially vulnerable System/Kernel -
openSUSE Tumbleweed
src-oss
tmon 1.0.gb61442df748f06e9 Potentially vulnerable System/Base -
openSUSE network Tumbleweed usbip 6.15.2 Potentially vulnerable Hardware/Other -
OpenWrt 23.05 x86_64
packages
usbip-client 2.0 Potentially vulnerable net nunojpg@gmail.com
OpenWrt 23.05 x86_64
packages
usbip-server 2.0 Potentially vulnerable net nunojpg@gmail.com
OpenWrt 23.05 x86_64
packages
usbip 2.0 Potentially vulnerable net nunojpg@gmail.com
OpenWrt 24.10 x86_64
base
tmon 6.6.93 Potentially vulnerable devel fe@dev.tdt.de
OpenWrt 24.10 x86_64
packages
usbip-client 2.0 Potentially vulnerable net nunojpg@gmail.com
OpenWrt 24.10 x86_64
packages
usbip-server 2.0 Potentially vulnerable net nunojpg@gmail.com
OpenWrt 24.10 x86_64
packages
usbip 2.0 Potentially vulnerable net nunojpg@gmail.com
pacstall linux-headers-deb 6.16~rc2 Potentially vulnerable - oren@taumoda.com
pacstall linux-kernel 6.16~rc2 Potentially vulnerable - oren@taumoda.com
pacstall linux-kernel-lts-6.6 6.6.63 Potentially vulnerable - jimedrand@disroot.org
Parabola
extra
bpf 6.15 Potentially vulnerable - -
Parabola
extra
hyperv 6.15 Potentially vulnerable - -
Parabola
extra
bootconfig 6.15 Potentially vulnerable - -
Parabola
extra
intel-speed-select 6.15 Potentially vulnerable - -
Parabola
extra
kcpuid 6.15 Potentially vulnerable - -
Pardus 21
updates/main
linux-6.1 6.1.137 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
updates/main
linux-6.1 6.1.129 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
updates/main
linux-6.1 6.1.128 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
updates/main
linux-6.1 6.1.119 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
updates/main
linux 5.10.237 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
updates/main
linux 5.10.234 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
main
linux 5.10.223 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
main
linux 5.10.218 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
main
linux 5.10.46 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
main
linux 5.10.28 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Pardus 21
main
linux 5.10.13 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Parrot
parrot/main
linux 6.12.12 Potentially vulnerable kernel palinuro@parrotsec.org
Parrot
parrot-updates/main
linux 6.12.12 Potentially vulnerable kernel palinuro@parrotsec.org
PCLinuxOS kernel-userspace-headers 6.12.33 Potentially vulnerable System/Kernel and hardware -
PCLinuxOS tmon 5.12 Potentially vulnerable Monitoring -
PCLinuxOS turbostat 5.12 Potentially vulnerable Monitoring -
Pisi Linux
core
cpupowertools 6.6.92 Potentially vulnerable app:console ertugrulerata@gmail.com
Pisi Linux
core
kernel 6.6.92 Potentially vulnerable kernel ertugrulerata@gmail.com
Pisi Linux
main
perf 5.15.81 Potentially vulnerable app:gui ertugrulerata@gmail.com
PLD Linux kernel 6.14.8 Potentially vulnerable - -
PLD Linux kernel-tools 6.14.0 Potentially vulnerable - -
PLD Linux kernel-6.12 6.12.30 Potentially vulnerable - -
PLD Linux kernel-6.6 6.6.92 Potentially vulnerable - -
PLD Linux kernel-6.1 6.1.140 Potentially vulnerable - -
PLD Linux kernel-5.15 5.15.184 Potentially vulnerable - -
PLD Linux kernel-5.10 5.10.237 Potentially vulnerable - -
PLD Linux kernel-5.4 5.4.293 Potentially vulnerable - -
PLD Linux kernel-4.19 4.19.325 Potentially vulnerable - -
postmarketOS 24.12
aarch64
linux-next 6.12_git20241128 Potentially vulnerable - caleb@postmarketos.org
postmarketOS master
aarch64
linux-next 6.16_git20250620 Potentially vulnerable - kcxt@postmarketos.org
PTXdist usbip 5.8 Potentially vulnerable - -
PureOS amber
amber/main
linux 4.19.249 Potentially vulnerable debian-installer debian-kernel@lists.debian.org, ben@decadent.org.uk, carnil@debian.org, maks@debian.org, waldi@debian.org
PureOS byzantium
byzantium/main
linux 5.10.209 Potentially vulnerable debian-installer debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
PureOS landing
landing/main
linux 6.12.32 Potentially vulnerable debian-installer debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Raspbian Oldstable
main
linux-6.1 6.1.137 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Raspbian Oldstable
main
linux 5.10.237 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Raspbian Oldstable
main
linux-tools 3.16 Potentially vulnerable devel debian-kernel@lists.debian.org, ben@decadent.org.uk, jrnieder@gmail.com, waldi@debian.org
Raspbian Stable
main
linux 6.1.140 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Raspbian Stable
main
linux-tools 3.16 Potentially vulnerable devel debian-kernel@lists.debian.org, ben@decadent.org.uk, jrnieder@gmail.com, waldi@debian.org
Raspbian Testing
main
linux 6.12.27 Potentially vulnerable kernel debian-kernel@lists.debian.org, benh@debian.org, carnil@debian.org, maks@debian.org, waldi@debian.org
Raspbian Testing
main
linux-tools 3.16 Potentially vulnerable devel debian-kernel@lists.debian.org, ben@decadent.org.uk, jrnieder@gmail.com, waldi@debian.org
Ravenports linux-api-headers 6.4.3 Potentially vulnerable devel kraileth@elderlinux.org
Ravenports evdev-proto 6.2 Potentially vulnerable devel fallback-mnt-ravenports@repology
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 8
BaseOS
kernel 4.18.0 Potentially vulnerable System Environment/Kernel releng@rockylinux.org
Rocky Linux 9
AppStream
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
CRB
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
NFV
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
RT
kernel 5.14.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rosa 2021.1
main/release
cpupower 6.7 Potentially vulnerable System/Kernel and hardware m.novosyolov@rosalinux.ru
Rosa 2021.1
contrib/release
usbip 5 Potentially vulnerable System/Configuration/Networking m.novosyolov@rosalinux.ru
Rosa 13
main/release
cpupower 6.7 Potentially vulnerable System/Kernel and hardware alexander@mezon.ru
Rosa 13
contrib/release
usbip 6 Potentially vulnerable System/Configuration/Networking alexander@mezon.ru
Rosa 13
main/release
usbip 6 Potentially vulnerable System/Configuration/Networking alexander@mezon.ru
Rosa 13
contrib/release
kernel-release 5.9.10 Potentially vulnerable System/Kernel and hardware alexander@mezon.ru
Rosa Server 6.9
base/release
kernel-lt 3.10.104 Potentially vulnerable System Environment/Kernel andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
kernel 2.6.32 Potentially vulnerable System Environment/Kernel andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
kernel 2.6.32 Potentially vulnerable System Environment/Kernel andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
kernel 2.6.32 Potentially vulnerable System Environment/Kernel andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
kernel 2.6.32 Potentially vulnerable System Environment/Kernel andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/updates
kernel 2.6.32 Potentially vulnerable System Environment/Kernel andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
cpupowerutils 1.3 Potentially vulnerable System Environment/Base andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
cpupowerutils 1.3 Potentially vulnerable System Environment/Base andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
cpupowerutils 1.2 Potentially vulnerable System Environment/Base andrew.lukoshko@rosalab.ru
Rosa Server 6.9
extra/release
usbip-utils 1.0.0 Potentially vulnerable System Environment/Base andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
tmon 0.9 Potentially vulnerable System Environment/Base andrew.lukoshko@rosalab.ru
Rosa Server 7.3
extra/release
kernel-lt 4.9.102 Potentially vulnerable System Environment/Kernel alex2048@mail.ru
Rosa Server 7.3
base/release
kernel 3.10.0 Potentially vulnerable System Environment/Kernel alex2048@mail.ru
Rosa Server 7.5
base/release
kernel 3.10.0 Potentially vulnerable System Environment/Kernel alex2048@mail.ru
Rosa Server 7.5
base/release
kernel 3.10.0 Potentially vulnerable System Environment/Kernel andrew.lukoshko@rosalab.ru
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Scientific Linux 7.x kernel 3.10.0 Potentially vulnerable System Environment/Kernel -
Side Linux kernel 5.15.184 Potentially vulnerable - uglyside@yandex.ru
SlackBuilds development/perf 5.15.161 Potentially vulnerable development andreas.guldstrand@gmail.com
Slackware 14.2
patches
kernel-headers 4.4.301 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
patches
kernel-headers 4.4.301_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
patches
kernel-source 4.4.301_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
extra
kernel-headers 4.4.14 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
kernel-headers 4.4.14_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
kernel-source 4.4.14_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.161 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.161_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-source 5.15.161_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.160 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.160_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-source 5.15.160_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.145 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.145_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-source 5.15.145_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.139 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.139_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-source 5.15.139_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.117 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-headers 5.15.117_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
kernel-source 5.15.117_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
extra
kernel-headers 5.15.19 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
kernel-headers 5.15.19_smp Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
kernel-source 5.15.19_smp Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
kernel-headers 6.12.34 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
kernel-source 6.12.34 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
patches
kernel-headers 4.4.301 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
patches
kernel-source 4.4.301 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
kernel-headers 4.4.14 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
kernel-source 4.4.14 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-headers 5.15.161 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-source 5.15.161 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-headers 5.15.160 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-source 5.15.160 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-headers 5.15.145 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-source 5.15.145 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-headers 5.15.139 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-source 5.15.139 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-headers 5.15.117 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
kernel-source 5.15.117 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
kernel-headers 5.15.19 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
kernel-source 5.15.19 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
kernel-headers 6.12.34 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
kernel-source 6.12.34 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
patches
kernel-headers 4.4.302 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
patches
kernel-source 4.4.302 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
kernel-headers 4.4.14 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
kernel-source 4.4.14 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
patches
kernel-headers 5.15.176 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
patches
kernel-source 5.15.176 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
kernel-headers 5.15.21 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
kernel-source 5.15.21 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking linux 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking lguest 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-acpi 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-agp 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-aoe 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-appletalk 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-arcnet 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-autofs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-bluetooth 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-bridge 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-chrome 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-cifs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-coda 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-configfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-cpufreq 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-cramfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-crypto 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-cryptoloop 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-debug 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-dialup 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-dlm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-drm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-ecryptfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-exofs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-firewire 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-firmware 3.16.55 Potentially vulnerable non-free devel@slitaz.org
SliTaz Cooking linux-gfs2 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-hfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-hfsplus 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-hwmon 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-input-misc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-input-tablet 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-input-touchscreen 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-ipv6 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-irda 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-isdn 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-jfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-joystick 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-kvm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-logfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-md 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-media 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-memstick 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-minix 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-mmc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-module-headers 3.16.55 Potentially vulnerable development devel@slitaz.org
SliTaz Cooking linux-mwave 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-nbd 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-ncpfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-netfilter 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-nfsd 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-ocfs2 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-reiserfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-romfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-sched 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-scsi 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-sound 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-source 3.16.55 Potentially vulnerable development devel@slitaz.org
SliTaz Cooking linux-speakup 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-squashfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-staging 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-toshiba 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-usb-misc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-usbdsl 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-usbip 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-uwb 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-video 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-wan 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-wimax 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-wireless 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-without-modules 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-without-modules-debug 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux-zram 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-acpi 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-agp 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-aoe 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-appletalk 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-arcnet 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-autofs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-bluetooth 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-bridge 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-chrome 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-cifs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-coda 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-configfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-cpufreq 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-cramfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-crypto 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-cryptoloop 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-debug 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-dialup 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-dlm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-drm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-ecryptfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-exofs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-firewire 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-gfs2 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-hfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-hfsplus 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-hwmon 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-input-misc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-input-tablet 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-input-touchscreen 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-ipv6 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-irda 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-isdn 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-jfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-joystick 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-kvm 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-logfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-md 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-media 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-memstick 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-minix 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-mmc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-module-headers 3.16.55 Potentially vulnerable development devel@slitaz.org
SliTaz Cooking linux64-mwave 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-nbd 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-ncpfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-netfilter 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-nfsd 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-ocfs2 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-radio 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-reiserfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-romfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-sched 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-scsi 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-sound 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-speakup 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-squashfs 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-staging 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-usb-misc 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-usbdsl 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-usbip 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-uwb 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-video 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-wan 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-wimax 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-wireless 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-without-modules 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-without-modules-debug 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking linux64-zram 3.16.55 Potentially vulnerable base-system devel@slitaz.org
SliTaz Cooking usbip 3.16.55 Potentially vulnerable system-tools devel@slitaz.org
SliTaz Cooking usbip-dev 3.16.55 Potentially vulnerable development devel@slitaz.org
SliTaz Cooking linux-api-headers 3.16.55 Potentially vulnerable development devel@slitaz.org
SliTaz Current linux-gpio 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-acpi 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-agp 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-aoe 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-appletalk 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-arcnet 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-autofs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-bluetooth 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-bridge 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-chrome 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-cifs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-coda 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-configfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-cpufreq 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-cramfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-crypto 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-cryptoloop 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-debug 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-dialup 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-dlm 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-drm 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-ecryptfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-exofs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-firewire 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-gfs2 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-hfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-hfsplus 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-hwmon 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-input-misc 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-input-tablet 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-input-touchscreen 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-ipv6 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-isdn 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-jffs2 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-jfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-joystick 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-kvm 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-l2tp 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-logfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-md 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-media 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-memstick 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-minix 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-mmc 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-module-headers 5.10.238 Potentially vulnerable development devel@slitaz.org
SliTaz Current linux-mtd 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-mwave 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-nbd 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-ncpfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-netfilter 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-nfsd 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-ocfs2 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-openvswitch 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-overlayfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-agp 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-chrome 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-crypto 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-drm 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-hfsplus 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-input-touchscreen 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-ipv6 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-module-headers 5.10.238 Potentially vulnerable development devel@slitaz.org
SliTaz Current linux-pae-netfilter 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-overlayfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-sound 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-speakup 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-wireless 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-pae-zram 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-reiserfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-romfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-sched 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-scsi 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-sound 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-source 5.10.238 Potentially vulnerable development devel@slitaz.org
SliTaz Current linux-speakup 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-squashfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-staging 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-toshiba 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-ubifs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-usb-misc 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-usbdsl 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-usbip 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-video 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-wan 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-wimax 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-wireless 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-without-modules 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-without-modules-debug 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux-zram 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-acpi 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-agp 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-aoe 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-appletalk 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-arcnet 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-autofs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-bluetooth 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-bridge 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-chrome 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-cifs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-coda 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-configfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-cpufreq 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-cramfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-crypto 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-cryptoloop 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-debug 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-dialup 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-dlm 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-drm 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-ecryptfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-exofs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-firewire 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-gfs2 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-hfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-hfsplus 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-hwmon 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-input-misc 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-input-tablet 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-input-touchscreen 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-ipv6 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-isdn 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-jfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-joystick 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-kvm 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-logfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-md 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-media 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-memstick 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-minix 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-mmc 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-module-headers 5.10.238 Potentially vulnerable development devel@slitaz.org
SliTaz Current linux64-mwave 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-nbd 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-ncpfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-netfilter 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-nfsd 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-ocfs2 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-overlayfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-radio 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-reiserfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-romfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-sched 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-scsi 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-sound 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-speakup 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-squashfs 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-staging 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-usb-misc 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-usbdsl 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-usbip 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-video 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-wan 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-wimax 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-wireless 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-without-modules 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-without-modules-debug 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current linux64-zram 5.10.238 Potentially vulnerable base-system devel@slitaz.org
SliTaz Current usbip 5.10.238 Potentially vulnerable system-tools devel@slitaz.org
SliTaz Current usbip-dev 5.10.238 Potentially vulnerable development devel@slitaz.org
SliTaz Current linux-api-headers 5.10.238 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-acpi 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-agp 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-aoe 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-appletalk 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-arcnet 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-autofs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-bluetooth 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-bridge 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-btrfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cifs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-coda 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cpufreq 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cramfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-crypto 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cryptoloop 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-dialup 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-dlm 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-drm 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ecryptfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-efi 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ethernet 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-exofs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-firewire 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-gfs2 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hfsplus 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hid 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hwmon 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ide 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-input-misc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-input-tablet 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-input-touchscreen 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ipv6 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-isdn 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-jfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-joystick 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-kvm 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-md 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-media 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-memstick 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-minix 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-mmc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-module-headers 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-mwave 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ncpfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nbd 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-netfilter 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nfc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nfsd 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ocfs2 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-orangefs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-radio 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-reiserfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-romfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-sched 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-scsi 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-sound 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-source 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-speakup 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-squashfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-staging 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usb-gadget 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usb-misc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usbdsl 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usbip 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-uwb 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-video 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-wan 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-watchdog 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-wimax 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-wireless 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-without-modules 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-zram 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-acpi 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-agp 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-aoe 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-appletalk 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-arcnet 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-autofs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-bluetooth 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-bridge 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-btrfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cifs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-coda 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cpufreq 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cramfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-crypto 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-cryptoloop 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-dialup 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-dlm 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-drm 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ecryptfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-efi 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ethernet 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-exofs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-firewire 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-gfs2 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hfsplus 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hid 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-hwmon 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ide 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-input-misc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-input-tablet 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ncpfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-input-touchscreen 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ipv6 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-isdn 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-jfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-joystick 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-kvm 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-md 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-media 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-memstick 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-minix 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-mmc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-module-headers 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-mwave 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nbd 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-netfilter 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nfc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-nfsd 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-ocfs2 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-orangefs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-radio 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-reiserfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-romfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-sched 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-scsi 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-sound 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-source 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-speakup 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-squashfs 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-staging 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usb-gadget 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usb-misc 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usbdsl 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-usbip 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-uwb 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-video 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-wan 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-watchdog 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-wimax 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-wireless 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-without-modules 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-zram 4.17.7 Potentially vulnerable base-system devel@slitaz.org
SliTaz Next linux-dev 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-api-headers 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-dev 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next linux-api-headers 4.17.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next usbip 0.1.7 Potentially vulnerable system-tools pascal.bellard@slitaz.org
SliTaz Next usbip-dev 0.1.7 Potentially vulnerable development pascal.bellard@slitaz.org
SliTaz Next usbip 0.1.7 Potentially vulnerable system-tools pascal.bellard@slitaz.org
SliTaz Next usbip-dev 0.1.7 Potentially vulnerable development pascal.bellard@slitaz.org
Solus linux-tools 6.14.4 Potentially vulnerable programming.tools josephriches@gmail.com
Solus linux-tools-bpftool 6.14.4 Potentially vulnerable system.utils josephriches@gmail.com
Solus linux-tools-cpupower 6.14.4 Potentially vulnerable programming.library josephriches@gmail.com
Solus linux-tools-cpupower-devel 6.14.4 Potentially vulnerable programming.devel josephriches@gmail.com
Solus linux-tools-dbginfo 6.14.4 Potentially vulnerable debug josephriches@gmail.com
Solus linux-tools-turbostat 6.14.4 Potentially vulnerable system.utils josephriches@gmail.com
Solus linux-tools-x86_energy_perf_policy 6.14.4 Potentially vulnerable system.utils josephriches@gmail.com
Solus linux-headers 6.14 Potentially vulnerable system.devel reilly@reillybrogan.com
Solus linux-lts 6.12.28 Potentially vulnerable kernel.image reilly@reillybrogan.com
Solus linux-lts-dbginfo 6.12.28 Potentially vulnerable debug reilly@reillybrogan.com
Solus linux-lts-headers 6.12.28 Potentially vulnerable kernel.devel reilly@reillybrogan.com
Spack linux-headers 6.9.1 Potentially vulnerable - fallback-mnt-spack@repology
stal/IX bin/kernel/6/15 6.15.2 Potentially vulnerable bin anton@samokhvalov.xyz
stal/IX lib/linux/headers/next 6.15.2 Potentially vulnerable lib anton@samokhvalov.xyz
stal/IX dev bin/kernel/6/15 6.15.3 Potentially vulnerable bin anton@samokhvalov.xyz
stal/IX dev lib/linux/headers/next 6.15.3 Potentially vulnerable lib anton@samokhvalov.xyz
T2 SDE linux 6.15.3 Potentially vulnerable base/kernel rene@t2-project.org
T2 SDE perf 6.15.3 Potentially vulnerable base/tool rene@t2-project.org
T2 SDE linux-header 6.6 Potentially vulnerable base/system rene@t2-project.org
Terra 40 tmon 20241215.git~e8cae0d Unspecified sad_lerm@hotmail.com
Terra 41 tmon 20241215.git~e8cae0d Unspecified sad_lerm@hotmail.com
Terra rawhide tmon 20241215.git~e8cae0d Unspecified sad_lerm@hotmail.com
Terra rawhide tmon 20241215.git~e8cae0d Unspecified sad_lerm@hotmail.com
Tin Can Linux
core
linux-headers 6.5.3 Potentially vulnerable - avs.origami@gmail.com
Trisquel 10.0
nabia-updates/main
linux 5.4.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Trisquel 10.0
nabia-updates/main
linux 5.4.0 Potentially vulnerable devel trisquel-devel@listas.trisquel.info
Trisquel 10.0
nabia/main
linux 5.4.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Trisquel 11.0
aramo-updates/main
linux 5.15.0 Potentially vulnerable devel trisquel-devel@listas.trisquel.info
Trisquel 11.0
aramo/main
linux 5.15.0 Potentially vulnerable devel trisquel-devel@listas.trisquel.info
Ubuntu 14.04
trusty-updates/main
linux-lts-xenial 4.4.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 14.04
trusty-updates/main
linux-lts-wily 4.2.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 14.04
trusty-updates/main
linux-lts-vivid 3.19.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 14.04
trusty-updates/main
linux-lts-utopic 3.16.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 14.04
trusty/main
linux 3.13.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 14.04
trusty-updates/main
linux 3.13.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 14.04
trusty/universe
usbip 0.1.7 Potentially vulnerable universe/admin xam@debian.org
Ubuntu 16.04
xenial-updates/main
linux 4.4.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 16.04
xenial/main
linux 4.4.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 16.04
xenial/universe
usbip 0.1.7 Potentially vulnerable universe/admin xam@debian.org
Ubuntu 18.04
bionic/main
linux 4.15.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 18.04
bionic-updates/main
linux 4.15.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 20.04
focal-updates/main
linux 5.4.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 20.04
focal/main
linux 5.4.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 22.04
jammy/main
linux 5.15.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 22.04
jammy-updates/main
linux 5.15.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 24.04
noble-updates/main
linux 6.8.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 24.04
noble/main
linux 6.8.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 24.10
oracular-updates/main
linux 6.11.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 24.10
oracular/main
linux 6.11.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 25.04
plucky-updates/main
linux 6.14.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 25.04
plucky/main
linux 6.14.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 25.10
questing/main
linux 6.14.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Ubuntu 25.10 Proposed
questing-proposed/main
linux 6.15.0 Potentially vulnerable devel kernel-team@lists.ubuntu.com
Void Linux x86_64
x86_64
linux6.15 6.15.3 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.15-headers 6.15.3 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux-mainline 6.15 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
linux-mainline-headers 6.15 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
linux6.14 6.14.11 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.14-headers 6.14.11 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
kernel-libc-headers 6.14 Potentially vulnerable - ericonr@disroot.org
Void Linux x86_64
x86_64
linux6.13 6.13.12 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.13-headers 6.13.12 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.12 6.12.34 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.12-headers 6.12.34 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux 6.12 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
linux-headers 6.12 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
linux6.11 6.11.11 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.11-headers 6.11.11 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.10 6.10.14 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.10-headers 6.10.14 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.9 6.9.12 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.9-headers 6.9.12 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.8 6.8.12 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.8-headers 6.8.12 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.7 6.7.12 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.7-headers 6.7.12 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.6 6.6.94 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.6-headers 6.6.94 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.5 6.5.13 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux6.5-headers 6.5.13 Potentially vulnerable - duncaen@voidlinux.org
Void Linux x86_64
x86_64
linux-tools 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
perf 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
tmon 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
bpftool 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
cpupower 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
freefall 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
turbostat 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
usbip 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
x86_energy_perf_policy 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
libcpupower 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
libcpupower-devel 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
libusbip 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
libusbip-devel 6.5 Potentially vulnerable - gottox@voidlinux.org
Void Linux x86_64
x86_64
linux6.1 6.1.140 Potentially vulnerable - congdanhqx@gmail.com
Void Linux x86_64
x86_64
linux6.1-headers 6.1.140 Potentially vulnerable - congdanhqx@gmail.com
Void Linux x86_64
x86_64
linux-lts 6.1 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
linux-lts-headers 6.1 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
linux5.15 5.15.169 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
linux5.15-headers 5.15.169 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
linux5.10 5.10.228 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
linux5.10-headers 5.10.228 Potentially vulnerable - leah@vuxu.org
Void Linux x86_64
x86_64
linux5.4 5.4.266 Potentially vulnerable - orphan@voidlinux.org
Void Linux x86_64
x86_64
linux5.4-headers 5.4.266 Potentially vulnerable - orphan@voidlinux.org
Void Linux x86_64
x86_64
linux4.19 4.19.304 Potentially vulnerable - orphan@voidlinux.org
Void Linux x86_64
x86_64
linux4.19-headers 4.19.304 Potentially vulnerable - orphan@voidlinux.org
Wikidata Linux kernel 6.16-rc2 Potentially vulnerable - -
Wikidata Linux kernel 6.15.3 Potentially vulnerable - -