Versions Packages Information History CVEs Related Badges Report

Versions for lua

579 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
system
lua5.3-libs 5.3.5 Potentially vulnerable - fallback-mnt-adelie@repology
Adélie Linux current
system
lua5.3-doc 5.3.5 Potentially vulnerable - fallback-mnt-adelie@repology
Adélie Linux current
system
lua5.3-dbg 5.3.5 Potentially vulnerable - fallback-mnt-adelie@repology
Adélie Linux current
system
lua5.3-dev 5.3.5 Potentially vulnerable - fallback-mnt-adelie@repology
Adélie Linux current
system
lua5.3 5.3.5 Potentially vulnerable - fallback-mnt-adelie@repology
AIX Open Source Packages lua 5.4.0 Potentially vulnerable - -
AIX Open Source Packages lua 5.3.5 Potentially vulnerable - -
AIX Open Source Packages lua 5.3.4 Potentially vulnerable - -
AIX Open Source Packages lua 5.3.3 Potentially vulnerable - -
AIX Open Source Packages lua 5.3.2 Potentially vulnerable - -
AIX Open Source Packages lua 5.3.1 Potentially vulnerable - -
AIX Open Source Packages lua 5.3.0 Potentially vulnerable - -
AIX Open Source Packages lua 5.2.4 Potentially vulnerable - -
AIX Open Source Packages lua 5.2.3 Potentially vulnerable - -
AIX Open Source Packages lua 5.2.2 Potentially vulnerable - -
AIX Open Source Packages lua 5.2.1 Potentially vulnerable - -
AIX Open Source Packages lua 5.2.0 Potentially vulnerable - -
AIX Open Source Packages lua 5.2.0 Potentially vulnerable - -
AIX Open Source Packages lua 5.2.0 Potentially vulnerable - -
AIX Open Source Packages lua 5.1.5 Potentially vulnerable - -
AIX Open Source Packages lua 5.1.4 Potentially vulnerable - -
AIX Open Source Packages lua 5.1.4 Potentially vulnerable - -
AIX Open Source Packages lua 5.1.4 Potentially vulnerable - -
Alpine Linux 3.8
main
lua5.3-libs 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
lua5.3-doc 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
lua5.3-dev 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
lua5.3 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
lua5.2-doc 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
lua5.2-dev 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
lua5.2 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
lua5.2-libs 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
lua5.1-doc 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
lua5.1-dev 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
lua5.1 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
lua5.1-libs 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
lua5.3-libs 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
lua5.3-doc 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
lua5.3-dev 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
lua5.3 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
lua5.2-libs 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
lua5.2 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
lua5.2-doc 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
lua5.2-dev 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
lua5.1-doc 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
lua5.1-libs 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
lua5.1 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
lua5.1-dev 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
lua5.3 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
lua5.3-dev 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
lua5.3-doc 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
lua5.3-libs 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
lua5.2-doc 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
lua5.2-dev 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
lua5.2 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
lua5.2-libs 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
lua5.1-doc 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
lua5.1-dev 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
lua5.1 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
lua5.1-libs 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
lua5.3-doc 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
lua5.3-libs 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
lua5.3-dev 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
lua5.3 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
lua5.2-dev 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
lua5.2 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
lua5.2-libs 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
lua5.2-doc 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
lua5.1-dev 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
lua5.1 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
lua5.1-libs 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
lua5.1-doc 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
lua5.3-libs 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
lua5.3-dev 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
lua5.3-doc 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
lua5.3 5.3.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
lua5.2-doc 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
lua5.2-libs 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
lua5.2 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
lua5.2-dev 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
lua5.1-libs 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
lua5.1-doc 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
lua5.1 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
lua5.1-dev 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
lua5.3-dev 5.3.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
lua5.3 5.3.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
lua5.3-doc 5.3.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
lua5.3-libs 5.3.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
lua5.2-doc 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
lua5.2-dev 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
lua5.2 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
lua5.2-libs 5.2.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
lua5.1 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
lua5.1-libs 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
lua5.1-dev 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
lua5.1-doc 5.1.5 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 lua5.3 5.3.5 Potentially vulnerable Development/Other vseleznv@altlinux.org
ALT Linux p9 lua5.1 5.1.5 Potentially vulnerable Development/Other viy@altlinux.org
ALT Sisyphus lua5.3 5.3.5 Potentially vulnerable Development/Other cow@altlinux.org
ALT Sisyphus lua5.1 5.1.5 Potentially vulnerable Development/Other vseleznv@altlinux.org
Amazon Linux 1
main
lua 5.1.4 Potentially vulnerable Development/Languages -
Amazon Linux 2 lua53 5.3.5 Potentially vulnerable Unspecified -
Amazon Linux 2 lua53 5.3.5 Potentially vulnerable Unspecified -
Amazon Linux 2 lua 5.1.4 Potentially vulnerable Development/Languages -
Amazon Linux 2 lua 5.1.4 Potentially vulnerable Development/Languages -
AOSC lua-5.3 5.3.6 Potentially vulnerable devel fallback-mnt-aosc@repology
AOSC lua 5.1.5 Potentially vulnerable devel fallback-mnt-aosc@repology
Apertis v2020
v2020/target
lua5.3 5.3.3 Potentially vulnerable main gareuselesinge@debian.org, ondrej@debian.org
Apertis v2020
v2020/target
lua5.2 5.2.4 Potentially vulnerable main gareuselesinge@debian.org, jbelmonte@debian.org
Apertis v2020
v2020/development
lua5.1 5.1.5 Potentially vulnerable main jbelmonte@debian.org, gareuselesinge@debian.org
Apertis v2021 Development
v2021dev3/target
lua5.3 5.3.3 Potentially vulnerable main gareuselesinge@debian.org, ondrej@debian.org
Apertis v2021 Development
v2021dev3/target
lua5.2 5.2.4 Potentially vulnerable main gareuselesinge@debian.org, jbelmonte@debian.org
Apertis v2021 Development
v2021dev3/development
lua5.1 5.1.5 Potentially vulnerable main jbelmonte@debian.org, gareuselesinge@debian.org
Arch
extra
lua 5.4.1 - -
Arch
extra
lua53 5.3.6 Potentially vulnerable - -
Arch
extra
lua52 5.2.4 Potentially vulnerable - -
Arch
extra
lua51 5.1.5 Potentially vulnerable - -
AUR lua54 5.4.0 Potentially vulnerable - edub4rt@aur
AUR lib32-lua 5.3.5 Potentially vulnerable - ducakar@aur
Astra Orel Stable
main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Astra Orel Stable
main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Astra Orel Stable
main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Astra Orel Current
main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Astra Orel Current
main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Astra Orel Current
main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Ataraxia Linux lua 5.4.1 interpreters nagakamira@gmail.com
Ataraxia Linux lua52 5.2.4 Potentially vulnerable interpreters nagakamira@gmail.com
Ataraxia Linux lua51 5.1.5 Potentially vulnerable interpreters nagakamira@gmail.com
Buckaroo lua 5.3.4 Potentially vulnerable - -
Buckaroo lua 5.1.0 Potentially vulnerable - -
Carbs Linux
community
lua 5.4.1 - cem@ckyln.com
CentOS 6
os
lua 5.1.4 Potentially vulnerable Development/Languages -
CentOS 7
os
lua 5.1.4 Potentially vulnerable Development/Languages -
CentOS 8
BaseOS
lua 5.3.4 Potentially vulnerable Development/Languages bugs@centos.org
Chakra
core
lua 5.3.4 Potentially vulnerable - -
Chakra
core
lua52 5.2.4 Potentially vulnerable - -
Chakra
core
lua51 5.1.5 Potentially vulnerable - -
Chocolatey lua 53 Binaries 5.3.5 Potentially vulnerable - -
Chocolatey lua 52 Binaries 5.2.4 Potentially vulnerable - -
Chocolatey Lua For Windows 5.1.5.52 Potentially vulnerable - -
Chocolatey lua 51 Binaries 5.1.5 Potentially vulnerable - -
ConanCenter lua 5.4.1 - -
ConanCenter lua 5.3.5 Potentially vulnerable - -
CRUX 3.4
opt
lua 5.3.5 Potentially vulnerable - crux@romster.me
CRUX 3.4
opt
lua52 5.2.4 Potentially vulnerable - crux@romster.me
CRUX 3.4
opt
lua51 5.1.5 Potentially vulnerable - crux@romster.me
CRUX 3.5
opt
lua 5.4.1 - crux@romster.me
CRUX 3.5
opt
lua53 5.3.6 Potentially vulnerable - crux@romster.me
CRUX 3.5
opt
lua52 5.2.4 Potentially vulnerable - crux@romster.me
CRUX 3.5
opt
lua51 5.1.5 Potentially vulnerable - crux@romster.me
Cygwin lua 5.3.5 Potentially vulnerable Interpreters yaakov.selkowitz@cygwin
Cygwin lua-debuginfo 5.3.5 Potentially vulnerable Debug yaakov.selkowitz@cygwin
Cygwin lua-devel 5.3.5 Potentially vulnerable Interpreters yaakov.selkowitz@cygwin
Cygwin lua5.1 5.1.5 Potentially vulnerable Interpreters yaakov.selkowitz@cygwin
Cygwin lua5.1-debuginfo 5.1.5 Potentially vulnerable Debug yaakov.selkowitz@cygwin
Cygwin lua5.1-devel 5.1.5 Potentially vulnerable Interpreters yaakov.selkowitz@cygwin
Debian Oldstable
oldstable/main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Debian Oldstable
oldstable/main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Debian Oldstable
oldstable/main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Debian Oldstable
oldstable/main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
Debian Stable
stable/main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Debian Stable
stable/main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Debian Stable
stable/main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Debian Stable
stable/main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
Debian Testing
testing/main
lua5.4 5.4.0 Potentially vulnerable misc pkg-lua-devel@lists.alioth.debian.org, sgolovan@debian.org
Debian Testing
testing/main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Debian Testing
testing/main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Debian Testing
testing/main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Debian Testing
testing/main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
Debian Unstable
main
lua5.4 5.4.1 misc pkg-lua-devel@lists.alioth.debian.org, sgolovan@debian.org
Debian Unstable
main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Debian Unstable
main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Debian Unstable
main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Debian Unstable
main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
Deepin
main
lua5.3 5.3.3 Potentially vulnerable interpreters gareuselesinge@debian.org, ondrej@debian.org
Deepin
main
lua5.2 5.2.4.1 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Deepin
main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Deepin
main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
Devuan 1.0 (Jessie)
jessie/main
lua5.2 5.2.3 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Devuan 1.0 (Jessie)
jessie/main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Devuan 1.0 (Jessie)
jessie/main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
Devuan 2.0 (ASCII)
ascii/main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Devuan 2.0 (ASCII)
ascii/main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Devuan 2.0 (ASCII)
ascii/main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Devuan 2.0 (ASCII)
ascii/main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
lua5.4 5.4.0 Potentially vulnerable misc pkg-lua-devel@lists.alioth.debian.org, sgolovan@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
Devuan Unstable
unstable/main
lua5.4 5.4.1 misc pkg-lua-devel@lists.alioth.debian.org, sgolovan@debian.org
Devuan Unstable
unstable/main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Devuan Unstable
unstable/main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Devuan Unstable
unstable/main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Devuan Unstable
unstable/main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
DistroWatch.com lua 5.4.1 - -
DPorts lang/lua53 5.3.5 Potentially vulnerable lang russ.haley@gmail.com
DPorts lang/lua52 5.2.4 Potentially vulnerable lang john@essenz.com
DPorts lang/lua51 5.1.5 Potentially vulnerable lang nicklaus.t@me.com
Entware
mipselsf-k3.4
liblua5.3 5.3.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
mipssf-k3.4
liblua5.3 5.3.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
x64-k3.2
liblua5.3 5.3.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv7sf-k2.6
liblua5.3 5.3.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv7sf-k3.2
liblua5.3 5.3.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
aarch64-k3.10
liblua5.3 5.3.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
armv5sf-k3.2
liblua5.3 5.3.5 Potentially vulnerable libs fallback-mnt-entware@repology
Entware
mipselsf-k3.4
liblua 5.1.5 Potentially vulnerable libs jo@mein.io
Entware
mipssf-k3.4
liblua 5.1.5 Potentially vulnerable libs jo@mein.io
Entware
mipssf-k3.4
lua 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
mipssf-k3.4
lua-examples 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
mipssf-k3.4
luac 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
x64-k3.2
liblua 5.1.5 Potentially vulnerable libs jo@mein.io
Entware
x64-k3.2
lua 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
x64-k3.2
lua-examples 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
x64-k3.2
luac 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
mipselsf-k3.4
lua 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
armv7sf-k3.2
liblua 5.1.5 Potentially vulnerable libs jo@mein.io
Entware
armv7sf-k3.2
lua 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
mipselsf-k3.4
lua-examples 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
mipselsf-k3.4
luac 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
armv7sf-k3.2
lua-examples 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
armv7sf-k3.2
luac 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
aarch64-k3.10
liblua 5.1.5 Potentially vulnerable libs jo@mein.io
Entware
aarch64-k3.10
lua 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
aarch64-k3.10
lua-examples 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
aarch64-k3.10
luac 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
armv5sf-k3.2
liblua 5.1.5 Potentially vulnerable libs jo@mein.io
Entware
armv5sf-k3.2
lua 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
armv5sf-k3.2
lua-examples 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
armv5sf-k3.2
luac 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
armv7sf-k2.6
liblua 5.1.5 Potentially vulnerable libs jo@mein.io
Entware
armv7sf-k2.6
lua 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
armv7sf-k2.6
lua-examples 5.1.5 Potentially vulnerable lang jo@mein.io
Entware
armv7sf-k2.6
luac 5.1.5 Potentially vulnerable lang jo@mein.io
EPEL 8 compat-lua 5.1.5 Potentially vulnerable Unspecified -
Exherbo
arbor
dev-lang/lua 5.3.5 Potentially vulnerable dev-lang fallback-mnt-exherbo@repology
Exherbo
arbor
dev-lang/lua 5.2.4 Potentially vulnerable dev-lang fallback-mnt-exherbo@repology
Exherbo
arbor
dev-lang/lua 5.1.5 Potentially vulnerable dev-lang fallback-mnt-exherbo@repology
Fedora 26
updates
lua 5.3.4 Potentially vulnerable Development/Languages -
Fedora 26
release
lua 5.3.4 Potentially vulnerable Development/Languages -
Fedora 26
release
compat-lua 5.1.5 Potentially vulnerable Development/Languages -
Fedora 27
release
lua 5.3.4 Potentially vulnerable Development/Languages -
Fedora 27
updates
lua 5.3.4 Potentially vulnerable Development/Languages -
Fedora 27
release
compat-lua 5.1.5 Potentially vulnerable Development/Languages -
Fedora 28
release
lua 5.3.4 Potentially vulnerable Development/Languages -
Fedora 28
release
compat-lua 5.1.5 Potentially vulnerable Development/Languages -
Fedora 29
release
lua 5.3.5 Potentially vulnerable Development/Languages -
Fedora 29
updates
lua 5.3.5 Potentially vulnerable Development/Languages -
Fedora 29
release
compat-lua 5.1.5 Potentially vulnerable Development/Languages -
Fedora 29
updates
compat-lua 5.1.5 Potentially vulnerable Unspecified -
Fedora 30
release
lua 5.3.5 Potentially vulnerable Unspecified -
Fedora 30
updates
compat-lua 5.1.5 Potentially vulnerable Unspecified -
Fedora 30
release
compat-lua 5.1.5 Potentially vulnerable Unspecified -
Fedora 31
release
lua 5.3.5 Potentially vulnerable Unspecified -
Fedora 31
updates
lua 5.3.5 Potentially vulnerable Unspecified -
Fedora 31
release
compat-lua 5.1.5 Potentially vulnerable Unspecified -
Fedora 32
release
lua 5.3.5 Potentially vulnerable Unspecified -
Fedora 32
updates
lua 5.3.5 Potentially vulnerable Unspecified -
Fedora 32
release
compat-lua 5.1.5 Potentially vulnerable Unspecified -
Fedora 33
updates
lua 5.4.1 Unspecified -
Fedora 33
release
lua 5.4.0 Potentially vulnerable Unspecified -
Fedora 33
release
compat-lua 5.1.5 Potentially vulnerable Unspecified -
Fedora Rawhide lua 5.4.1 Unspecified -
Fedora Rawhide compat-lua 5.1.5 Potentially vulnerable Unspecified -
FreeBSD Ports lang/lua54 5.4.1 lang russ.haley@gmail.com
FreeBSD Ports lang/lua53 5.3.6 Potentially vulnerable lang russ.haley@gmail.com
FreeBSD Ports lang/lua52 5.2.4 Potentially vulnerable lang john@essenz.com
FreeBSD Ports lang/lua51 5.1.5 Potentially vulnerable lang nicklaus.t@me.com
freshcode.club lua 5.3.0 Potentially vulnerable - -
Funtoo 1.4
lang-kit
dev-lua/lua 5.3.5 Potentially vulnerable dev-lua fallback-mnt-funtoo@repology
Funtoo 1.4
lang-kit
dev-lua/lua 5.2.4 Potentially vulnerable dev-lua fallback-mnt-funtoo@repology
Funtoo 1.4
lang-kit
dev-lang/lua 5.1.5 Potentially vulnerable dev-lang rafaelmartins@gentoo.org, williamh@gentoo.org
Gentoo dev-lang/lua 5.4.1 dev-lang williamh@gentoo.org, robbat2@gentoo.org
Gentoo dev-lang/lua 5.3.6 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
Gentoo dev-lang/lua 5.3.5 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
Gentoo dev-lang/lua 5.2.4 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
Gentoo dev-lang/lua 5.1.5 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
Gentoo dev-lang/lua 5.1.5 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
Gentoo dev-lang/lua 5.1.5 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
Gentoo dev-lang/lua 5.1.5 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
Gentoo dev-lang/lua 5.1.5 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
GNU Guix lua 5.3.5 Potentially vulnerable - -
GNU Guix lua 5.2.4 Potentially vulnerable - -
GNU Guix lua 5.1.5 Potentially vulnerable - -
GoboLinux Lua 5.3.5 Potentially vulnerable - -
HaikuPorts master dev-lang/lua 5.4.0~beta Potentially vulnerable dev-lang -
HaikuPorts master dev-lang/lua 5.3.5 Potentially vulnerable dev-lang -
HaikuPorts master dev-lang/lua 5.2.4 Potentially vulnerable dev-lang -
HaikuPorts master dev-lang/lua 5.1.5 Potentially vulnerable dev-lang -
Homebrew lua 5.3.5 Potentially vulnerable - -
Homebrew lua@5.1 5.1.5 Potentially vulnerable - -
Hyperbola
extra
lua 5.3.4 Potentially vulnerable - -
Hyperbola
extra
lua52 5.2.4 Potentially vulnerable - -
Hyperbola
extra
lua51 5.1.5 Potentially vulnerable - -
IBM i lua 5.3.4 Potentially vulnerable Unspecified -
Kali Linux Rolling
main
lua5.4 5.4.0 Potentially vulnerable misc pkg-lua-devel@lists.alioth.debian.org, sgolovan@debian.org
Kali Linux Rolling
main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Kali Linux Rolling
main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Kali Linux Rolling
main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Kali Linux Rolling
main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
KaOS
main
lua 5.2.4 Potentially vulnerable - demm@kaosx.us
KISS Linux Community
community
lua 5.4.1 - me@danielm.pw
Kwort 4.3.4 lua 5.4.0 Potentially vulnerable - -
LiGurOS 20.7
nokit
dev-lang/lua 5.3.5 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
LiGurOS 20.7
nokit
dev-lang/lua 5.2.4 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
LiGurOS 20.7
nokit
dev-lang/lua 5.1.5 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
LiGurOS 20.7
nokit
dev-lang/lua 5.1.5 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
LiGurOS 20.7
nokit
dev-lang/lua 5.1.5 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
LiGurOS 21.1
nokit
dev-lang/lua 5.3.5 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
LiGurOS 21.1
nokit
dev-lang/lua 5.2.4 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
LiGurOS 21.1
nokit
dev-lang/lua 5.1.5 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
LiGurOS 21.1
nokit
dev-lang/lua 5.1.5 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
LiGurOS 21.1
nokit
dev-lang/lua 5.1.5 Potentially vulnerable dev-lang williamh@gentoo.org, robbat2@gentoo.org
Linuxbrew lua 5.3.5 Potentially vulnerable - -
Linuxbrew lua@5.1 5.1.5 Potentially vulnerable - -
MacPorts lua 5.3.5 Potentially vulnerable lang nomaintainer@macports.org
MacPorts lua52 5.2.4 Potentially vulnerable lang nomaintainer@macports.org
MacPorts lua51 5.1.5 Potentially vulnerable lang nomaintainer@macports.org
MacPorts lua50 5.0.3 Potentially vulnerable lang nomaintainer@macports.org
Maemo Fremantle lua5.1 5.1.4 Potentially vulnerable - jbelmonte@debian.org, gareuselesinge@debian.org
Mageia 6
core/release
lua 5.2.4 Potentially vulnerable Development/Other -
Mageia 6
core/release
lua5.1 5.1.5 Potentially vulnerable Development/Other -
Mageia 7
core/release
lua5.3 5.3.5 Potentially vulnerable Development/Other -
Mageia 7
core/updates
lua5.3 5.3.5 Potentially vulnerable Development/Other -
Mageia 7
core/release
lua 5.2.4 Potentially vulnerable Development/Other -
Mageia 7
core/updates
lua 5.2.4 Potentially vulnerable Development/Other -
Mageia 7
core/release
lua5.1 5.1.5 Potentially vulnerable Development/Other -
Mageia Cauldron
core/release
lua5.3 5.3.5 Potentially vulnerable Development/Other -
Mageia Cauldron
core/release
lua 5.2.4 Potentially vulnerable Development/Other -
Mageia Cauldron
core/release
lua5.1 5.1.5 Potentially vulnerable Development/Other -
Manjaro Stable
extra
lua 5.4.1 - -
Manjaro Stable
extra
lua53 5.3.6 Potentially vulnerable - -
Manjaro Stable
extra
lua52 5.2.4 Potentially vulnerable - -
Manjaro Stable
extra
lua51 5.1.5 Potentially vulnerable - -
Manjaro Testing
extra
lua 5.4.1 - -
Manjaro Testing
extra
lua53 5.3.6 Potentially vulnerable - -
Manjaro Testing
extra
lua52 5.2.4 Potentially vulnerable - -
Manjaro Testing
extra
lua51 5.1.5 Potentially vulnerable - -
Manjaro Unstable
extra
lua 5.4.1 - -
Manjaro Unstable
extra
lua53 5.3.6 Potentially vulnerable - -
Manjaro Unstable
extra
lua52 5.2.4 Potentially vulnerable - -
Manjaro Unstable
extra
lua51 5.1.5 Potentially vulnerable - -
MidnightBSD mports lang/lua53 5.3.5 Potentially vulnerable lang -
MidnightBSD mports lang/lua52 5.2.4 Potentially vulnerable lang -
MidnightBSD mports lang/lua51 5.1.5 Potentially vulnerable lang -
MSYS2 mingw
x86_64
mingw-w64-x86_64-lua 5.3.5 Potentially vulnerable - alexpux@gmail.com
MSYS2 mingw
i686
mingw-w64-i686-lua 5.3.5 Potentially vulnerable - alexpux@gmail.com
MSYS2 mingw
x86_64
mingw-w64-x86_64-lua51 5.1.5 Potentially vulnerable - alexpux@jmail.com
MSYS2 mingw
i686
mingw-w64-i686-lua51 5.1.5 Potentially vulnerable - alexpux@jmail.com
nixpkgs stable lua 5.3.5 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable lua 5.3.5 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable lua 5.3.5 Potentially vulnerable lua53Packages fallback-mnt-nix@repology
nixpkgs stable lua 5.2.4 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable lua 5.2.4 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable lua 5.2.4 Potentially vulnerable lua52Packages fallback-mnt-nix@repology
nixpkgs stable lua 5.1.5 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable lua 5.1.5 Potentially vulnerable lua51Packages fallback-mnt-nix@repology
nixpkgs unstable lua 5.3.5 Potentially vulnerable lua53Packages fallback-mnt-nix@repology
nixpkgs unstable lua 5.3.5 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable lua 5.3.5 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable lua 5.2.4 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable lua 5.2.4 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable lua 5.2.4 Potentially vulnerable lua52Packages fallback-mnt-nix@repology
nixpkgs unstable lua 5.1.5 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable lua 5.1.5 Potentially vulnerable lua51Packages fallback-mnt-nix@repology
Npackd Stable Lua 5.1.5.52 Potentially vulnerable Development -
Npackd Stable Lua 5.1.5.51 Potentially vulnerable Development -
Npackd Stable Lua 5.1.4.50 Potentially vulnerable Development -
Npackd Stable Lua 5.1.4.46 Potentially vulnerable Development -
OpenBSD Ports lang/lua/5.3 5.3.5 Potentially vulnerable lang ports@openbsd.org
OpenBSD Ports lang/lua/5.2 5.2.4 Potentially vulnerable lang ports@openbsd.org
OpenBSD Ports lang/lua/5.1 5.1.5 Potentially vulnerable lang ports@openbsd.org
openEuler 20.03
source
lua 5.3.5 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
lua 5.3.6 Potentially vulnerable Development/Other Languages -
OpenIndiana packages
hipster
lua 5.3.2 Potentially vulnerable Development/Other Languages -
OpenIndiana packages
hipster
lua 5.2.4 Potentially vulnerable Development/Other Languages -
OpenMandriva 4.0
main/release
lua 5.3.5 Potentially vulnerable Development/Other bero@lindev.ch
OpenMandriva 4.0
main/release
lua5.2 5.2.4 Potentially vulnerable Development/Other bero@lindev.ch
OpenMandriva 4.0
unsupported/release
lua5.0 5.0.3 Potentially vulnerable Development/Other bero@lindev.ch
OpenMandriva 4.1
main/release
lua 5.3.5 Potentially vulnerable Development/Other nobodydead@gmail.com
OpenMandriva 4.1
main/release
lua5.2 5.2.4 Potentially vulnerable Development/Other nobodydead@gmail.com
OpenMandriva 4.1
unsupported/release
lua5.0 5.0.3 Potentially vulnerable Development/Other bero@lindev.ch
OpenMandriva Rolling
main/release
lua 5.3.5 Potentially vulnerable Development/Other bero@lindev.ch
OpenMandriva Rolling
main/release
lua5.2 5.2.4 Potentially vulnerable Development/Other bero@lindev.ch
OpenMandriva Rolling
unsupported/release
lua5.1 5.1.5 Potentially vulnerable Development/Other angrypenguinpoland@gmail.com
OpenMandriva Rolling
unsupported/release
lua5.0 5.0.3 Potentially vulnerable Development/Other bero@lindev.ch
OpenMandriva Cooker
main/release
lua 5.3.5 Potentially vulnerable Development/Other bero@lindev.ch
OpenMandriva Cooker
main/release
lua5.2 5.2.4 Potentially vulnerable Development/Other bero@lindev.ch
OpenMandriva Cooker
unsupported/release
lua5.1 5.1.5 Potentially vulnerable Development/Other bero@lindev.ch
OpenMandriva Cooker
unsupported/release
lua5.0 5.0.3 Potentially vulnerable Development/Other bero@lindev.ch
OpenPKG lua 5.4.1 Language -
OpenPKG lua51 5.1.5 Potentially vulnerable Language -
openSUSE Leap 42.3
main/oss
lua 5.2.4 Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
main/oss
lua51 5.1.5 Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
updates/oss
lua51 5.1.5 Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
main/oss
lua53 5.3.4 Potentially vulnerable Development/Languages/Other -
openSUSE Leap 15.0
updates/oss
lua53 5.3.4 Potentially vulnerable Development/Languages/Other -
openSUSE Leap 15.0
main/oss
lua51 5.1.5 Potentially vulnerable Development/Languages/Other -
openSUSE Leap 15.1
main/oss
lua53 5.3.4 Potentially vulnerable Development/Languages/Other -
openSUSE Leap 15.1
main/oss
lua51 5.1.5 Potentially vulnerable Development/Languages/Other -
openSUSE Leap 15.2
main/oss
lua53 5.3.4 Potentially vulnerable Development/Languages/Other -
openSUSE Leap 15.2
main/oss
lua51 5.1.5 Potentially vulnerable Development/Languages/Other -
openSUSE Tumbleweed lua54 5.4.1 Development/Languages/Other -
openSUSE Tumbleweed lua53 5.3.6 Potentially vulnerable Development/Languages/Other -
openSUSE Tumbleweed lua51 5.1.5 Potentially vulnerable Development/Languages/Other -
OpenWrt 17.01 x86_64
base
liblua 5.1.5 Potentially vulnerable libs jo@mein.io
OpenWrt 17.01 x86_64
base
lua-examples 5.1.5 Potentially vulnerable lang jo@mein.io
OpenWrt 17.01 x86_64
base
lua 5.1.5 Potentially vulnerable lang jo@mein.io
OpenWrt 17.01 x86_64
base
luac 5.1.5 Potentially vulnerable lang jo@mein.io
OpenWrt 18.06 x86_64
base
liblua 5.1.5 Potentially vulnerable libs jo@mein.io
OpenWrt 18.06 x86_64
base
lua-examples 5.1.5 Potentially vulnerable lang jo@mein.io
OpenWrt 18.06 x86_64
base
lua 5.1.5 Potentially vulnerable lang jo@mein.io
OpenWrt 18.06 x86_64
base
luac 5.1.5 Potentially vulnerable lang jo@mein.io
OpenWrt 19.07 x86_64
base
liblua5.1.5 5.1.5 Potentially vulnerable libs jo@mein.io
OpenWrt 19.07 x86_64
base
lua-examples 5.1.5 Potentially vulnerable lang jo@mein.io
OpenWrt 19.07 x86_64
base
lua 5.1.5 Potentially vulnerable lang jo@mein.io
OpenWrt 19.07 x86_64
base
luac 5.1.5 Potentially vulnerable lang jo@mein.io
OS4Depot liblua 5.2.4 Potentially vulnerable development/language -
OS4Depot lua 5.1-2 Potentially vulnerable development/language -
Parabola
extra
lua 5.4.1 - -
Parabola
extra
lua53 5.3.6 Potentially vulnerable - -
Parabola
extra
lua52 5.2.4 Potentially vulnerable - -
Parabola
extra
lua51 5.1.5 Potentially vulnerable - -
Pardus
main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Pardus
main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Pardus
main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Pardus
main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
Parrot
main
lua5.4 5.4.0 Potentially vulnerable misc pkg-lua-devel@lists.alioth.debian.org, sgolovan@debian.org
Parrot
main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Parrot
main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Parrot
main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Parrot
main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
PCLinuxOS lua5.3 5.3.5 Potentially vulnerable Development/Other -
PCLinuxOS lua5.2 5.2.4 Potentially vulnerable Development/Other -
PCLinuxOS lua5.1 5.1.5 Potentially vulnerable Development/Other -
PCLinuxOS lua5.0 5.0.3 Potentially vulnerable Development/Other -
Pisi Linux
main
lua 5.3.5 Potentially vulnerable library admins@pisilinux.org
Pisi Linux
main
lua52 5.2.4 Potentially vulnerable library admins@pisilinux.org
Pisi Linux
main
lua51 5.1.5 Potentially vulnerable library admins@pisilinux.org
pkgsrc current lang/lua54 5.4.1 lang pkgsrc-users@netbsd.org
pkgsrc current lang/lua53 5.3.6 Potentially vulnerable lang pkgsrc-users@netbsd.org
pkgsrc current lang/lua52 5.2.4 Potentially vulnerable lang pkgsrc-users@netbsd.org
pkgsrc current lang/lua51 5.1.5 Potentially vulnerable lang pkgsrc-users@netbsd.org
PLD Linux lua53 5.3.5 Potentially vulnerable - -
PLD Linux lua52 5.2.4 Potentially vulnerable - -
PLD Linux lua51 5.1.5 Potentially vulnerable - -
PLD Linux lua40 4.0.1 Potentially vulnerable - -
PureOS Amber lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
PureOS Amber lua5.2 5.2.4 Potentially vulnerable misc gareuselesinge@debian.org, jbelmonte@debian.org
PureOS Amber lua5.1 5.1.5 Potentially vulnerable misc jbelmonte@debian.org, gareuselesinge@debian.org
PureOS Amber lua50 5.0.3 Potentially vulnerable misc gareuselesinge@debian.org
PureOS landing lua5.4 5.4.0 Potentially vulnerable misc pkg-lua-devel@lists.alioth.debian.org, sgolovan@debian.org
PureOS landing lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
PureOS landing lua5.2 5.2.4 Potentially vulnerable misc gareuselesinge@debian.org, jbelmonte@debian.org
PureOS landing lua5.1 5.1.5 Potentially vulnerable misc jbelmonte@debian.org, gareuselesinge@debian.org
PureOS landing lua50 5.0.3 Potentially vulnerable misc gareuselesinge@debian.org
Raspbian Oldstable
main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Raspbian Oldstable
main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Raspbian Oldstable
main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Raspbian Oldstable
main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
Raspbian Stable
main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Raspbian Stable
main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Raspbian Stable
main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Raspbian Stable
main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
Raspbian Testing
main
lua5.4 5.4.0 Potentially vulnerable misc pkg-lua-devel@lists.alioth.debian.org, sgolovan@debian.org
Raspbian Testing
main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Raspbian Testing
main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Raspbian Testing
main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Raspbian Testing
main
lua50 5.0.3 Potentially vulnerable interpreters gareuselesinge@debian.org
Ravenports lua54 5.4.1 lang fallback-mnt-ravenports@repology
Ravenports lua53 5.3.6 Potentially vulnerable lang fallback-mnt-ravenports@repology
Ravenports lua52 5.2.4 Potentially vulnerable lang fallback-mnt-ravenports@repology
Rosa 2014.1
main/release
lua 5.2.3 Potentially vulnerable - -
Rosa 2014.1
main/release
lua5.1 5.1.5 Potentially vulnerable - -
Rosa 2014.1
contrib/release
lua5.0 5.0.3 Potentially vulnerable - -
Rosa 2016.1
main/updates
lua 5.3.5 Potentially vulnerable - -
Rosa 2016.1
main/release
lua 5.3.3 Potentially vulnerable - -
Rosa 2016.1
main/release
lua5.2 5.2.4 Potentially vulnerable - -
Rosa 2016.1
main/release
lua5.1 5.1.5 Potentially vulnerable - -
Rosa 2016.1
contrib/release
lua5.0 5.0.3 Potentially vulnerable - -
Rosa 2019.1
main/release
lua 5.3.5 Potentially vulnerable Development/Other alexander@mezon.ru
Rosa 2019.1
main/release
lua5.2 5.2.4 Potentially vulnerable Development/Other alexander@mezon.ru
Rosa 2019.1
main/release
lua5.1 5.1.5 Potentially vulnerable Development/Other alexander@mezon.ru
Rosa 2019.1
contrib/release
lua5.0 5.0.3 Potentially vulnerable Development/Other alexander@mezon.ru
Rosa Server 6.9
base/release
lua 5.1.4 Potentially vulnerable Development/Languages andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
lua 5.1.4 Potentially vulnerable Development/Languages alex2048@mail.ru
Rosa Server 7.5
base/release
lua 5.1.4 Potentially vulnerable Development/Languages alex2048@mail.ru
Scientific Linux 7.x lua 5.1.4 Potentially vulnerable Development/Languages -
Scientific Linux 7.x lua 5.1.4 Potentially vulnerable Development/Languages -
Scientific Linux 7.x lua 5.1.4 Potentially vulnerable Development/Languages -
Scoop
main
lua 5.4.1 - -
SlackBuilds development/lua53 5.3.4 Potentially vulnerable development zanculmarktum@gmail.com
SlackBuilds development/lua52 5.2.4 Potentially vulnerable development zanculmarktum@gmail.com
SlackBuilds development/lua 5.1.5 Potentially vulnerable development ponce@slackbuilds.org
SliTaz Cooking lua 5.2.4 Potentially vulnerable development pankso@slitaz.org
SliTaz Cooking lua-dev 5.2.4 Potentially vulnerable development pankso@slitaz.org
SliTaz Cooking lua5.1 5.1.5 Potentially vulnerable development pankso@slitaz.org
SliTaz Cooking lua5.1-dev 5.1.5 Potentially vulnerable development pankso@slitaz.org
SliTaz Next lua 5.3.4 Potentially vulnerable development devel@slitaz.org
SliTaz Next liblua 5.3.4 Potentially vulnerable libs devel@slitaz.org
SliTaz Next lua-dev 5.3.4 Potentially vulnerable development devel@slitaz.org
SliTaz Next lua5.1 5.1.5 Potentially vulnerable development devel@slitaz.org
SliTaz Next lua5.1-dev 5.1.5 Potentially vulnerable development devel@slitaz.org
Solus lua 5.3.4 Potentially vulnerable programming joshua@stroblindustries.com
Solus lua-dbginfo 5.3.4 Potentially vulnerable debug joshua@stroblindustries.com
Solus lua-devel 5.3.4 Potentially vulnerable programming.devel joshua@stroblindustries.com
Solus lua51 5.1.5 Potentially vulnerable programming joshua@stroblindustries.com
Solus lua51-dbginfo 5.1.5 Potentially vulnerable debug joshua@stroblindustries.com
Solus lua51-devel 5.1.5 Potentially vulnerable programming.devel joshua@stroblindustries.com
T2 SDE lua 5.4.1 extra/development rene@t2-project.org
Termux liblua54 5.4.1 - termux@termux
Termux liblua53 5.3.5 Potentially vulnerable - termux@termux
Termux liblua52 5.2.4 Potentially vulnerable - termux@termux
Trisquel 6.0
toutatis/main
lua5.2 5.2.0 Potentially vulnerable universe/interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Trisquel 6.0
toutatis-updates/main
lua5.2 5.2.0 Potentially vulnerable universe/interpreters ubuntu-devel-discuss@lists.ubuntu.com, jbelmonte@debian.org
Trisquel 6.0
toutatis/main
lua5.1 5.1.4 Potentially vulnerable interpreters ubuntu-devel-discuss@lists.ubuntu.com, gareuselesinge@debian.org
Trisquel 6.0
toutatis-updates/main
lua5.1 5.1.4 Potentially vulnerable interpreters ubuntu-devel-discuss@lists.ubuntu.com, gareuselesinge@debian.org
Trisquel 6.0
toutatis/main
lua50 5.0.3 Potentially vulnerable universe/interpreters gareuselesinge@debian.org
Trisquel 7.0
belenos/main
lua5.2 5.2.3 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Trisquel 7.0
belenos/main
lua5.1 5.1.5 Potentially vulnerable universe/interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Trisquel 7.0
belenos-updates/main
lua5.1 5.1.5 Potentially vulnerable interpreters ubuntu-devel-discuss@lists.ubuntu.com, gareuselesinge@debian.org
Trisquel 7.0
belenos/main
lua50 5.0.3 Potentially vulnerable universe/interpreters gareuselesinge@debian.org
Trisquel 8.0
flidas/main
lua5.3 5.3.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas-updates/main
lua5.3 5.3.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas/main
lua5.2 5.2.4 Potentially vulnerable interpreters ubuntu-devel-discuss@lists.ubuntu.com, jbelmonte@debian.org
Trisquel 8.0
flidas/main
lua5.1 5.1.5 Potentially vulnerable interpreters ubuntu-devel-discuss@lists.ubuntu.com, gareuselesinge@debian.org
Trisquel 8.0
flidas/main
lua50 5.0.3 Potentially vulnerable universe/interpreters gareuselesinge@debian.org
Trisquel 9.0
etiona/main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Trisquel 9.0
etiona-updates/main
lua5.3 5.3.3 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, ondrej@debian.org
Trisquel 9.0
etiona/main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Trisquel 9.0
etiona/main
lua5.1 5.1.5 Potentially vulnerable universe/interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Trisquel 9.0
etiona/main
lua50 5.0.3 Potentially vulnerable universe/interpreters gareuselesinge@debian.org
Ubuntu 12.04
precise/universe
lua5.2 5.2.0 Potentially vulnerable universe/interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Ubuntu 12.04
precise-updates/universe
lua5.2 5.2.0 Potentially vulnerable universe/interpreters ubuntu-devel-discuss@lists.ubuntu.com, jbelmonte@debian.org
Ubuntu 12.04
precise/main
lua5.1 5.1.4 Potentially vulnerable interpreters ubuntu-devel-discuss@lists.ubuntu.com, gareuselesinge@debian.org
Ubuntu 12.04
precise-updates/main
lua5.1 5.1.4 Potentially vulnerable interpreters ubuntu-devel-discuss@lists.ubuntu.com, gareuselesinge@debian.org
Ubuntu 12.04
precise/universe
lua50 5.0.3 Potentially vulnerable universe/interpreters gareuselesinge@debian.org
Ubuntu 14.04
trusty/main
lua5.2 5.2.3 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Ubuntu 14.04
trusty/main
lua5.1 5.1.5 Potentially vulnerable interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Ubuntu 14.04
trusty-updates/main
lua5.1 5.1.5 Potentially vulnerable interpreters ubuntu-devel-discuss@lists.ubuntu.com, gareuselesinge@debian.org
Ubuntu 14.04
trusty/universe
lua50 5.0.3 Potentially vulnerable universe/interpreters gareuselesinge@debian.org
Ubuntu 16.04
xenial/main
lua5.3 5.3.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial-updates/main
lua5.3 5.3.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial/main
lua5.2 5.2.4 Potentially vulnerable interpreters ubuntu-devel-discuss@lists.ubuntu.com, jbelmonte@debian.org
Ubuntu 16.04
xenial/main
lua5.1 5.1.5 Potentially vulnerable interpreters ubuntu-devel-discuss@lists.ubuntu.com, gareuselesinge@debian.org
Ubuntu 16.04
xenial/universe
lua50 5.0.3 Potentially vulnerable universe/interpreters gareuselesinge@debian.org
Ubuntu 18.04
bionic/main
lua5.3 5.3.3 Potentially vulnerable misc gareuselesinge@debian.org, ondrej@debian.org
Ubuntu 18.04
bionic-updates/main
lua5.3 5.3.3 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, ondrej@debian.org
Ubuntu 18.04
bionic/main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Ubuntu 18.04
bionic/universe
lua5.1 5.1.5 Potentially vulnerable universe/interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Ubuntu 18.04
bionic/universe
lua50 5.0.3 Potentially vulnerable universe/interpreters gareuselesinge@debian.org
Ubuntu 19.10
eoan/main
lua5.3 5.3.3 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, ondrej@debian.org
Ubuntu 19.10
eoan/main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Ubuntu 19.10
eoan/universe
lua5.1 5.1.5 Potentially vulnerable universe/interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Ubuntu 19.10
eoan/universe
lua50 5.0.3 Potentially vulnerable universe/interpreters gareuselesinge@debian.org
Ubuntu 20.04
focal/main
lua5.3 5.3.3 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, ondrej@debian.org
Ubuntu 20.04
focal/main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Ubuntu 20.04
focal/universe
lua5.1 5.1.5 Potentially vulnerable universe/interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Ubuntu 20.04
focal/universe
lua50 5.0.3 Potentially vulnerable universe/interpreters gareuselesinge@debian.org
Ubuntu 20.10
groovy/universe
lua5.4 5.4.0 Potentially vulnerable universe/misc pkg-lua-devel@lists.alioth.debian.org, sgolovan@debian.org
Ubuntu 20.10
groovy/main
lua5.3 5.3.3 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, ondrej@debian.org
Ubuntu 20.10
groovy/main
lua5.2 5.2.4 Potentially vulnerable interpreters gareuselesinge@debian.org, jbelmonte@debian.org
Ubuntu 20.10
groovy/universe
lua5.1 5.1.5 Potentially vulnerable universe/interpreters jbelmonte@debian.org, gareuselesinge@debian.org
Ubuntu 20.10
groovy/universe
lua50 5.0.3 Potentially vulnerable universe/interpreters gareuselesinge@debian.org
Vcpkg lua 5.4.1 - -
Void Linux x86_64
x86_64
lua54 5.4.1 - daniel@octaforge.org
Void Linux x86_64
x86_64
lua54-devel 5.4.1 - daniel@octaforge.org
Void Linux x86_64
x86_64
lua 5.3.5 Potentially vulnerable - daniel@octaforge.org
Void Linux x86_64
x86_64
lua-devel 5.3.5 Potentially vulnerable - daniel@octaforge.org
Void Linux x86_64
x86_64
lua53 5.3.5 Potentially vulnerable - daniel@octaforge.org
Void Linux x86_64
x86_64
lua53-devel 5.3.5 Potentially vulnerable - daniel@octaforge.org
Void Linux x86_64
x86_64
lua52 5.2.4 Potentially vulnerable - daniel@octaforge.org
Void Linux x86_64
x86_64
lua52-devel 5.2.4 Potentially vulnerable - daniel@octaforge.org
Void Linux x86_64
x86_64
lua51 5.1.5 Potentially vulnerable - daniel@octaforge.org
Void Linux x86_64
x86_64
lua51-devel 5.1.5 Potentially vulnerable - daniel@octaforge.org
Wikidata Lua 5.4.0 Potentially vulnerable - -

Absent in repositories

  • antiX-16
  • antiX-17
  • antiX-19
  • AppGet
  • Arch Testing
  • BlackArch
  • BlackBox 6
  • BlackBox 7
  • BunsenLabs Hydrogen
  • BunsenLabs Hydrogen/Jessie Backports
  • BunsenLabs Helium
  • BunsenLabs Helium/Stretch Backports
  • Calculate
  • Chakra Staging
  • Chakra Testing
  • Chaotic-AUR
  • CPAN
  • MetaCPAN
  • CRAN
  • crates.io
  • Deb Multimedia Unstable
  • Debian Stable Backports
  • Debian Experimental
  • distri
  • ELRepo el7
  • ELRepo el7 Testing
  • EPEL 6
  • EPEL 7
  • F-Droid
  • Gentoo overlay GURU
  • Gentoo overlay Pentoo
  • Gentoo Science overlay
  • GNU Elpa
  • Hackage
  • Homebrew Casks
  • Homebrew tap Brewsci/bio
  • HP-UX 11.31
  • just-install
  • KaOS Build
  • KaOS kde-next
  • KDE neon Dev Stable
  • KDE neon Dev Unstable
  • KDE neon User
  • KDE neon User LTS
  • KISS Linux Games
  • KISS Linux Main
  • Kwort 4.3.2
  • Kwort 4.3.3
  • Libregamewiki
  • Linux Mint 17
  • Linux Mint 17.1
  • Linux Mint 17.2
  • Linux Mint 17.3
  • Linux Mint 18
  • Linux Mint 18.1
  • Linux Mint 18.2
  • Linux Mint 18.3
  • Linux Mint 19
  • Linux Mint 19.1
  • Linux Mint 19.2
  • Linux Mint 19.3
  • Linux Mint 20.0
  • LuaRocks
  • MELPA
  • MSYS2 msys2
  • MX Linux MX-15
  • MX Linux MX-15 Testing
  • MX Linux MX-16
  • MX Linux MX-17
  • MX Linux MX-17 Testing
  • MX Linux MX-19
  • MX Linux MX-19 Testing
  • NeuroDebian data
  • NeuroDebian Debian 8
  • NeuroDebian Debian 9
  • NeuroDebian Debian 10
  • NeuroDebian Debian Unstable
  • NeuroDebian Ubuntu 14.04
  • NeuroDebian Ubuntu 16.04
  • NeuroDebian Ubuntu 18.04
  • NeuroDebian Ubuntu 19.04
  • Npackd Stable64
  • Npackd Unstable
  • openSUSE Education Tumbleweed
  • openSUSE Emulators Tumbleweed
  • openSUSE Games Tumbleweed
  • openSUSE Graphics Tumbleweed
  • openSUSE Hardware:SDR Tumbleweed
  • openSUSE Multimedia:Apps Tumbleweed
  • openSUSE Multimedia:Libs Tumbleweed
  • openSUSE Network Tumbleweed
  • openSUSE Science Tumbleweed
  • openSUSE Security Tumbleweed
  • PackMan openSUSE Leap 42.3
  • PackMan openSUSE Leap 15.0
  • PackMan openSUSE Leap 15.1
  • PackMan openSUSE Leap 15.2
  • PackMan openSUSE Tumbleweed
  • PackMan SLE 12
  • PackMan SLE 15
  • Parabola Testing
  • Pisi Linux Contrib
  • PyPi
  • ReactOS rapps
  • RebornOS
  • RPM Fusion EL 6
  • RPM Fusion EL 7
  • RPM Fusion EL 8
  • RPM Fusion Fedora 28
  • RPM Fusion Fedora 29
  • RPM Fusion Fedora 30
  • RPM Fusion Fedora 31
  • RPM Fusion Fedora Rawhide
  • RPM Sphere
  • RubyGems
  • Sabayon
  • Sabayon for-gentoo
  • Salix 14.2
  • Siduction
  • Siduction Experimental
  • Slackware 14.2
  • Slackware current
  • Slackware64 14.2
  • Slackware64 current
  • Slackwarearm 14.2
  • Slackwarearm current
  • Sparky Stable
  • Sparky Testing
  • Stackage LTS Haskell
  • Stackage Nightly
  • Tails stable
  • Tails devel
  • Trisquel 6.0 backports
  • Trisquel 7.0 backports
  • Trisquel 8.0 backports
  • Trisquel 9.0 backports
  • Ubuntu 12.04 Backports
  • Ubuntu 14.04 Backports
  • Ubuntu 16.04 Backports
  • Ubuntu 18.04 Backports
  • Ubuntu 19.10 Backports
  • Ubuntu 19.10 Proposed
  • Ubuntu 20.04 Proposed
  • Ubuntu 20.10 Proposed
  • UnitedRPMs Fedora 30
  • UnitedRPMs Fedora 31
  • UnitedRPMs Fedora 32
  • UnitedRPMs Fedora 33
  • winget
  • YACP