Versions Packages Information History CVEs Related Badges Report

Versions for openssl

656 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
system
openssl-doc 1.1.1g - awilfox@adelielinux.org
Adélie Linux current
system
openssl 1.1.1g - awilfox@adelielinux.org
Adélie Linux current
system
openssl-dev 1.1.1g - awilfox@adelielinux.org
Adélie Linux current
system
libcrypto1.1 1.1.1g - awilfox@adelielinux.org
Adélie Linux current
system
libssl1.1 1.1.1g - awilfox@adelielinux.org
Adélie Linux current
system
openssl-dbg 1.1.1g - awilfox@adelielinux.org
Adélie Linux current
system
openssl-dev 1.1.1f Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
system
libcrypto1.1 1.1.1f Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
system
libssl1.1 1.1.1f Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
system
openssl-dbg 1.1.1f Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
system
openssl-doc 1.1.1f Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
system
openssl 1.1.1f Potentially vulnerable - awilfox@adelielinux.org
AIX Open Source Packages openssl 1.0.2s Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.2r Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.2q Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.2p Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.2o Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.2n Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.2m Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.2l Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.2k Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.2j Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.2j Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.2i Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.2h Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1u Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1u Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1t Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1s Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1r Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1r Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1q Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1p Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1o Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1m Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1l Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1k Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1j Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1i Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1h Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1g Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1f Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1e Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1e Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1d Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1d Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1c Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.1c Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0t Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0t Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0t Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0s Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0r Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0q Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0p Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0o Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0n Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0m Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0l Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0k Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0k Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0j Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0i Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0h Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0g Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0f Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0e Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0d Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0c Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0b Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0a Potentially vulnerable - -
AIX Open Source Packages openssl 1.0.0 Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8zh Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8zh Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8za Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8zb Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8zc Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8zd Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8ze Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8zf Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8zg Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8y Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8x Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8w Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8v Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8u Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8t Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8s Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8r Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8q Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8p Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8o Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8n Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8m Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8l Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8k Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8j Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8i Potentially vulnerable - -
AIX Open Source Packages openssl 0.9.8h Potentially vulnerable - -
Alpine Linux 3.8
main
libssl1.0 1.0.2u - timo.teras@iki.fi
Alpine Linux 3.8
main
openssl-dbg 1.0.2u - timo.teras@iki.fi
Alpine Linux 3.8
main
openssl-dev 1.0.2u - timo.teras@iki.fi
Alpine Linux 3.8
main
openssl 1.0.2u - timo.teras@iki.fi
Alpine Linux 3.8
main
libcrypto1.0 1.0.2u - timo.teras@iki.fi
Alpine Linux 3.8
main
openssl-doc 1.0.2u - timo.teras@iki.fi
Alpine Linux 3.9
main
libcrypto1.1 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.9
main
openssl-dev 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.9
main
openssl-doc 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.9
main
openssl-dbg 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.9
main
openssl 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.9
main
libssl1.1 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.10
main
libssl1.1 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.10
main
openssl-doc 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.10
main
openssl-dbg 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.10
main
libcrypto1.1 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.10
main
openssl 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.10
main
openssl-dev 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.11
main
openssl 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.11
main
openssl-libs-static 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.11
main
openssl-dbg 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.11
main
openssl-doc 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.11
main
libcrypto1.1 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.11
main
libssl1.1 1.1.1g - timo.teras@iki.fi
Alpine Linux 3.11
main
openssl-dev 1.1.1g - timo.teras@iki.fi
Alpine Linux Edge
main
openssl-doc 1.1.1g - timo.teras@iki.fi
Alpine Linux Edge
main
libcrypto1.1 1.1.1g - timo.teras@iki.fi
Alpine Linux Edge
main
libssl1.1 1.1.1g - timo.teras@iki.fi
Alpine Linux Edge
main
openssl-dbg 1.1.1g - timo.teras@iki.fi
Alpine Linux Edge
main
openssl-libs-static 1.1.1g - timo.teras@iki.fi
Alpine Linux Edge
main
openssl-dev 1.1.1g - timo.teras@iki.fi
Alpine Linux Edge
main
openssl 1.1.1g - timo.teras@iki.fi
ALT Linux p9 openssl1.1 1.1.1g System/Base glebfm@altlinux.org
ALT Linux p9 openssl10 1.0.2r Potentially vulnerable System/Base glebfm@altlinux.org
ALT Sisyphus openssl1.1 1.1.1g System/Base glebfm@altlinux.org
ALT Sisyphus openssl10 1.0.2r Potentially vulnerable System/Base glebfm@altlinux.org
Amazon Linux 1
updates
openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 1
main
openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 1
updates
openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 1
updates
openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 1
updates
openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 1
updates
openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 1
updates
openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 1
updates
openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 1
updates
openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 1
main
openssl098e 0.9.8e Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 openssl11 1.1.1c Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 openssl098e 0.9.8e Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 openssl098e 0.9.8e Potentially vulnerable System Environment/Libraries -
AOSC openssl 1.1.1g libs fallback-mnt-aosc@repology
AOSC openssl+32 1.1.1g libs fallback-mnt-aosc@repology
AOSC openssl+1.0 1.0.2t Potentially vulnerable libs fallback-mnt-aosc@repology
Arch
core
openssl 1.1.1.g - -
Arch
multilib
lib32-openssl 1.1.1.g - -
Arch
core
openssl-1.0 1.0.2.u - -
Arch
multilib
lib32-openssl-1.0 1.0.2.u - -
AUR openssl-git 1.1.1.r2775.g30a4cda5e0 - chocobo1@aur
AUR openssl-pre 1.1.1.g - thegoliath@aur
AUR openssl-purify 1.1.1.g - thegoliath@aur
AUR openssl-static 1.1.1.g - thegoliath@aur
AUR openssl-zlib 1.1.1.g - thegoliath@aur
AUR openssl-1.0-chacha20 1.0.2.u - astroprofundis@aur
AUR lib32-openssl100 1.0.2.k - yurikoles@aur
AUR lib32-openssl-chacha20 1.0.2.k - fallback-mnt-aur@repology
AUR libx32-openssl 1.0.2.e - fantix@aur
AUR lib32-openssl098 0.9.8.zh Potentially vulnerable - eworm@aur
AUR openssl098 0.9.8.zh Potentially vulnerable - eworm@aur
AUR openssl098-dev 0.9.8.zh Potentially vulnerable - pjaeger@aur
Astra Orel Stable
main
openssl 1.1.1d Potentially vulnerable utils pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Astra Orel Stable
main
openssl1.0 1.0.2u utils pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Astra Orel Current
main
openssl 1.1.1d Potentially vulnerable utils pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Astra Orel Current
main
openssl1.0 1.0.2u utils pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Buckaroo openssl 1.1.1 Potentially vulnerable - -
Buckaroo openssl 1.0.211 - -
CentOS 6
os
openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
CentOS 6
updates
openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
CentOS 6
os
openssl098e 0.9.8e Potentially vulnerable System Environment/Libraries -
CentOS 7
os
openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
CentOS 7
os
openssl098e 0.9.8e Potentially vulnerable System Environment/Libraries -
CentOS 8
BaseOS
openssl 1.1.1 Potentially vulnerable System Environment/Libraries bugs@centos.org
CentOS 8
AppStream
compat-openssl10 1.0.2o Potentially vulnerable System Environment/Libraries bugs@centos.org
Chakra
core
openssl 1.0.2.t - -
Chakra Staging
staging
openssl 1.1.1.f - -
Chocolatey OpenSSL 1.1.1.700 Potentially vulnerable - -
ConanCenter openssl 1.1.1g - -
ConanCenter openssl 1.1.1f Potentially vulnerable - -
ConanCenter openssl 1.1.1e Potentially vulnerable - -
ConanCenter openssl 1.1.1d Potentially vulnerable - -
ConanCenter openssl 1.1.1c Potentially vulnerable - -
ConanCenter openssl 1.1.1b Potentially vulnerable - -
ConanCenter openssl 1.1.1a Potentially vulnerable - -
ConanCenter openssl 1.1.1 Potentially vulnerable - -
ConanCenter openssl 1.1.0l - -
ConanCenter openssl 1.1.0k Potentially vulnerable - -
ConanCenter openssl 1.1.0j Potentially vulnerable - -
ConanCenter openssl 1.1.0i Potentially vulnerable - -
ConanCenter openssl 1.1.0h Potentially vulnerable - -
ConanCenter openssl 1.1.0g Potentially vulnerable - -
ConanCenter openssl 1.1.0f Potentially vulnerable - -
ConanCenter openssl 1.1.0e Potentially vulnerable - -
ConanCenter openssl 1.1.0d Potentially vulnerable - -
ConanCenter openssl 1.1.0c Potentially vulnerable - -
ConanCenter openssl 1.1.0b Potentially vulnerable - -
ConanCenter openssl 1.1.0a Potentially vulnerable - -
ConanCenter openssl 1.1.0 Potentially vulnerable - -
ConanCenter openssl 1.0.2u - -
ConanCenter openssl 1.0.2t Potentially vulnerable - -
ConanCenter openssl 1.0.2s Potentially vulnerable - -
ConanCenter openssl 1.0.2r Potentially vulnerable - -
ConanCenter openssl 1.0.2q Potentially vulnerable - -
ConanCenter openssl 1.0.2p Potentially vulnerable - -
ConanCenter openssl 1.0.2o Potentially vulnerable - -
ConanCenter openssl 1.0.2n Potentially vulnerable - -
ConanCenter openssl 1.0.2m Potentially vulnerable - -
ConanCenter openssl 1.0.2l Potentially vulnerable - -
ConanCenter openssl 1.0.2k Potentially vulnerable - -
ConanCenter openssl 1.0.2j Potentially vulnerable - -
ConanCenter openssl 1.0.2i Potentially vulnerable - -
ConanCenter openssl 1.0.2h Potentially vulnerable - -
ConanCenter openssl 1.0.2g Potentially vulnerable - -
ConanCenter openssl 1.0.2f Potentially vulnerable - -
ConanCenter openssl 1.0.2e Potentially vulnerable - -
ConanCenter openssl 1.0.2d Potentially vulnerable - -
ConanCenter openssl 1.0.2c Potentially vulnerable - -
ConanCenter openssl 1.0.2b Potentially vulnerable - -
ConanCenter openssl 1.0.2a Potentially vulnerable - -
ConanCenter openssl 1.0.2 Potentially vulnerable - -
CRUX 3.2
core
openssl 1.0.2k Potentially vulnerable - -
CRUX 3.3
core
openssl 1.0.2q Potentially vulnerable - -
CRUX 3.4
core
openssl 1.0.2s Potentially vulnerable - -
CRUX 3.5
core
openssl 1.1.1g - -
CRUX 3.5
contrib
openssl1 1.0.2u - -
Cygwin libssl-devel 1.1.1f Potentially vulnerable Net corinna.vinschen@cygwin, yaakov.selkowitz@cygwin
Cygwin libssl1.1 1.1.1f Potentially vulnerable Base corinna.vinschen@cygwin, yaakov.selkowitz@cygwin
Cygwin openssl 1.1.1f Potentially vulnerable Base corinna.vinschen@cygwin, yaakov.selkowitz@cygwin
Cygwin openssl-debuginfo 1.1.1f Potentially vulnerable Debug corinna.vinschen@cygwin, yaakov.selkowitz@cygwin
Cygwin openssl-perl 1.1.1f Potentially vulnerable Net corinna.vinschen@cygwin, yaakov.selkowitz@cygwin
Cygwin libssl1.0 1.0.2t Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin libssl1.0-devel 1.0.2t Potentially vulnerable Libs yaakov.selkowitz@cygwin
Cygwin openssl10-debuginfo 1.0.2t Potentially vulnerable Debug yaakov.selkowitz@cygwin
Debian Oldstable
oldstable/main
openssl 1.1.0l libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Debian Oldstable
oldstable/main
openssl1.0 1.0.2u misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Debian Stable
stable/main
openssl 1.1.1d Potentially vulnerable libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Debian Testing
testing/main
openssl 1.1.1g libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Debian Testing
testing/main
openssl 1.1.1d Potentially vulnerable libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Debian Testing
testing/main
openssl 1.1.1d Potentially vulnerable libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Debian Unstable
main
openssl 1.1.1g libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Debian Unstable
main
openssl 1.1.1d Potentially vulnerable libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Debian Unstable
main
openssl 1.1.1d Potentially vulnerable libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Deepin
main
openssl 1.1.0h Potentially vulnerable libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Deepin
main
openssl1.0 1.0.2o Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Devuan 1.0 (Jessie)
jessie/main
openssl 1.0.1t Potentially vulnerable libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be
Devuan 2.0 (ASCII)
ascii/main
openssl 1.1.0j Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Devuan 2.0 (ASCII)
ascii/main
openssl1.0 1.0.2r Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Devuan 3.0 (Beowulf)
beowulf/main
openssl 1.1.1d Potentially vulnerable libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Devuan 4.0 (Chimaera)
chimaera/main
openssl 1.1.1c Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Devuan Unstable
unstable/main
openssl 1.1.1g libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
distri openssl 1.1.1g - -
DistroWatch.com openssl 1.1.1g - -
DPorts security/openssl 1.1.1g security brnrd@freebsd.org
DPorts security/openssl-static 1.1.1d Potentially vulnerable security zrj@ef.irc
DPorts security/openssl-legacy-static 1.0.2u security zrj@ef.irc
Entware
aarch64-k3.10
libopenssl 1.1.1d Potentially vulnerable libs cotequeiroz@gmail.com
Entware
aarch64-k3.10
libopenssl-conf 1.1.1d Potentially vulnerable libs cotequeiroz@gmail.com
Entware
aarch64-k3.10
openssl-util 1.1.1d Potentially vulnerable utils cotequeiroz@gmail.com
Entware
armv5sf-k3.2
libopenssl 1.1.1d Potentially vulnerable libs cotequeiroz@gmail.com
Entware
armv5sf-k3.2
libopenssl-conf 1.1.1d Potentially vulnerable libs cotequeiroz@gmail.com
Entware
armv5sf-k3.2
openssl-util 1.1.1d Potentially vulnerable utils cotequeiroz@gmail.com
Entware
armv7sf-k2.6
libopenssl 1.1.1d Potentially vulnerable libs cotequeiroz@gmail.com
Entware
armv7sf-k2.6
libopenssl-conf 1.1.1d Potentially vulnerable libs cotequeiroz@gmail.com
Entware
armv7sf-k2.6
openssl-util 1.1.1d Potentially vulnerable utils cotequeiroz@gmail.com
Entware
armv7sf-k3.2
libopenssl 1.1.1d Potentially vulnerable libs cotequeiroz@gmail.com
Entware
armv7sf-k3.2
libopenssl-conf 1.1.1d Potentially vulnerable libs cotequeiroz@gmail.com
Entware
armv7sf-k3.2
openssl-util 1.1.1d Potentially vulnerable utils cotequeiroz@gmail.com
Entware
mipselsf-k3.4
libopenssl 1.1.1d Potentially vulnerable libs cotequeiroz@gmail.com
Entware
mipselsf-k3.4
libopenssl-conf 1.1.1d Potentially vulnerable libs cotequeiroz@gmail.com
Entware
mipselsf-k3.4
openssl-util 1.1.1d Potentially vulnerable utils cotequeiroz@gmail.com
Entware
mipssf-k3.4
libopenssl 1.1.1d Potentially vulnerable libs cotequeiroz@gmail.com
Entware
mipssf-k3.4
libopenssl-conf 1.1.1d Potentially vulnerable libs cotequeiroz@gmail.com
Entware
mipssf-k3.4
openssl-util 1.1.1d Potentially vulnerable utils cotequeiroz@gmail.com
Entware
x64-k3.2
libopenssl 1.1.1d Potentially vulnerable libs cotequeiroz@gmail.com
Entware
x64-k3.2
libopenssl-conf 1.1.1d Potentially vulnerable libs cotequeiroz@gmail.com
Entware
x64-k3.2
openssl-util 1.1.1d Potentially vulnerable utils cotequeiroz@gmail.com
EPEL 7 openssl11 1.1.1c Potentially vulnerable System Environment/Libraries -
Exherbo
arbor
dev-libs/openssl 1.1.1g dev-libs fallback-mnt-exherbo@repology
Exherbo
arbor
dev-libs/openssl 1.0.2t Potentially vulnerable dev-libs fallback-mnt-exherbo@repology
Fedora 26
updates
openssl 1.1.0h Potentially vulnerable System Environment/Libraries -
Fedora 26
release
openssl 1.1.0f Potentially vulnerable System Environment/Libraries -
Fedora 26
updates
compat-openssl10 1.0.2o Potentially vulnerable System Environment/Libraries -
Fedora 26
release
compat-openssl10 1.0.2j Potentially vulnerable System Environment/Libraries -
Fedora 27
updates
openssl 1.1.0i Potentially vulnerable System Environment/Libraries -
Fedora 27
release
openssl 1.1.0f Potentially vulnerable System Environment/Libraries -
Fedora 27
updates
compat-openssl10 1.0.2o Potentially vulnerable System Environment/Libraries -
Fedora 27
release
compat-openssl10 1.0.2j Potentially vulnerable System Environment/Libraries -
Fedora 28
updates
openssl 1.1.0i Potentially vulnerable System Environment/Libraries -
Fedora 28
release
openssl 1.1.0h Potentially vulnerable System Environment/Libraries -
Fedora 28
release
compat-openssl10 1.0.2o Potentially vulnerable System Environment/Libraries -
Fedora 29
updates
openssl 1.1.1d Potentially vulnerable Unspecified -
Fedora 29
release
openssl 1.1.1 Potentially vulnerable System Environment/Libraries -
Fedora 29
release
compat-openssl10 1.0.2o Potentially vulnerable System Environment/Libraries -
Fedora 29
updates
compat-openssl10 1.0.2o Potentially vulnerable Unspecified -
Fedora 30
updates
openssl 1.1.1g Unspecified -
Fedora 30
release
openssl 1.1.1b Potentially vulnerable Unspecified -
Fedora 30
release
compat-openssl10 1.0.2o Potentially vulnerable Unspecified -
Fedora 30
updates
compat-openssl10 1.0.2o Potentially vulnerable Unspecified -
Fedora 31
updates
openssl 1.1.1g Unspecified -
Fedora 31
release
openssl 1.1.1d Potentially vulnerable Unspecified -
Fedora 31
release
compat-openssl10 1.0.2o Potentially vulnerable Unspecified -
Fedora 32
updates
openssl 1.1.1g Unspecified -
Fedora 32
release
openssl 1.1.1d Potentially vulnerable Unspecified -
Fedora 32
release
compat-openssl10 1.0.2o Potentially vulnerable Unspecified -
Fedora Rawhide openssl 1.1.1g Unspecified -
Fedora Rawhide compat-openssl10 1.0.2o Potentially vulnerable Unspecified -
FreeBSD Ports security/openssl-devel 3.0.0.a2 security brnrd@freebsd.org
FreeBSD Ports security/openssl 1.1.1g security brnrd@freebsd.org
freshcode.club openssl 1.0.2 Potentially vulnerable - -
Funtoo 1.4
core-kit
dev-libs/openssl 1.1.1g dev-libs base-system@gentoo.org
Funtoo 1.4
core-kit
dev-libs/openssl 1.1.1b Potentially vulnerable dev-libs base-system@gentoo.org
Funtoo 1.4
core-kit
dev-libs/openssl 1.1.0j Potentially vulnerable dev-libs base-system@gentoo.org
Funtoo 1.4
core-kit
dev-libs/openssl-compat 1.0.2u dev-libs base-system@gentoo.org
Funtoo 1.4
core-kit
dev-libs/openssl-compat 1.0.2t Potentially vulnerable dev-libs base-system@gentoo.org
Funtoo 1.4
core-kit
dev-libs/openssl-compat 0.9.8z_p8 Potentially vulnerable dev-libs base-system@gentoo.org
Gentoo dev-libs/openssl 1.1.1g dev-libs base-system@gentoo.org
Gentoo dev-libs/openssl 1.1.1f Potentially vulnerable dev-libs base-system@gentoo.org
Gentoo dev-libs/openssl 1.1.1d Potentially vulnerable dev-libs base-system@gentoo.org
Gentoo dev-libs/openssl 1.1.0l dev-libs base-system@gentoo.org
Gentoo dev-libs/openssl-compat 1.0.2u dev-libs base-system@gentoo.org
Gentoo dev-libs/openssl 1.0.2u dev-libs base-system@gentoo.org
Gentoo dev-libs/openssl-compat 0.9.8z_p8 Potentially vulnerable dev-libs base-system@gentoo.org
GNU Guix openssl 1.1.1g - -
GNU Guix openssl 1.0.2u - -
GoboLinux OpenSSL 1.1.1d Potentially vulnerable - -
HaikuPorts master dev-libs/openssl 1.1.1g dev-libs -
HaikuPorts master dev-libs/openssl 1.1.1e Potentially vulnerable dev-libs -
Homebrew openssl@1.1 1.1.1g - -
HP-UX 11.31
hppa_32
openssl 1.0.2u - -
HP-UX 11.31
ia64_64
openssl 1.0.2u - -
HP-UX 11.31
hppa_32
openssl 1.0.2p Potentially vulnerable - -
HP-UX 11.31
ia64_64
openssl 1.0.2p Potentially vulnerable - -
HP-UX 11.31
hppa_32
openssl 1.0.2l Potentially vulnerable - -
HP-UX 11.31
ia64_32
openssl 1.0.2l Potentially vulnerable - -
HP-UX 11.31
ia64_64
openssl 1.0.2l Potentially vulnerable - -
HP-UX 11.31
hppa_32
openssl 1.0.2j Potentially vulnerable - -
Kali Linux Rolling
main
openssl 1.1.1g libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Kali Linux Rolling
main
openssl1.0 1.0.2q Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
KaOS
core
openssl 1.1.1.7 Potentially vulnerable - demm@kaosx.us
Kwort 4.3.2 openssl 1.0.2o Potentially vulnerable - -
Kwort 4.3.3 openssl 1.0.2r Potentially vulnerable - -
Kwort 4.3.4 openssl 1.1.1g - -
LiGurOS 20.1
core-kit
dev-libs/openssl 1.1.1g dev-libs base-system@gentoo.org
LiGurOS 20.1
core-kit
dev-libs/openssl 1.1.1f Potentially vulnerable dev-libs base-system@gentoo.org
LiGurOS 20.1
core-kit
dev-libs/openssl 1.1.1d Potentially vulnerable dev-libs base-system@gentoo.org
LiGurOS 20.1
core-kit
dev-libs/openssl 1.1.0l dev-libs base-system@gentoo.org
LiGurOS 20.1
core-kit
dev-libs/openssl 1.0.2u dev-libs base-system@gentoo.org
LiGurOS 20.1
nokit
dev-libs/openssl-compat 1.0.2u dev-libs base-system@gentoo.org
LiGurOS 20.1
nokit
dev-libs/openssl-compat 0.9.8z_p8 Potentially vulnerable dev-libs base-system@gentoo.org
LiGurOS 20.7
core-kit
dev-libs/openssl 1.1.1g dev-libs base-system@gentoo.org
LiGurOS 20.7
core-kit
dev-libs/openssl 1.1.1f Potentially vulnerable dev-libs base-system@gentoo.org
LiGurOS 20.7
core-kit
dev-libs/openssl 1.1.1d Potentially vulnerable dev-libs base-system@gentoo.org
LiGurOS 20.7
core-kit
dev-libs/openssl 1.1.0l dev-libs base-system@gentoo.org
LiGurOS 20.7
core-kit
dev-libs/openssl 1.0.2u dev-libs base-system@gentoo.org
LiGurOS 20.7
nokit
dev-libs/openssl-compat 1.0.2u dev-libs base-system@gentoo.org
LiGurOS 20.7
nokit
dev-libs/openssl-compat 0.9.8z_p8 Potentially vulnerable dev-libs base-system@gentoo.org
Linuxbrew openssl@1.1 1.1.1g - -
MacPorts openssl 1.1.1g devel larryv@macports, larryv@github, cal@macports, neverpanic@github
MacPorts openssl10 1.0.2u devel nomaintainer@macports.org
Mageia 6
core/updates
openssl 1.0.2r Potentially vulnerable System/Libraries -
Mageia 6
core/updates
openssl 1.0.2q Potentially vulnerable System/Libraries -
Mageia 6
core/updates
openssl 1.0.2p Potentially vulnerable System/Libraries -
Mageia 6
core/updates
openssl 1.0.2o Potentially vulnerable System/Libraries -
Mageia 6
core/updates
openssl 1.0.2n Potentially vulnerable System/Libraries -
Mageia 6
core/updates
openssl 1.0.2m Potentially vulnerable System/Libraries -
Mageia 6
core/release
openssl 1.0.2l Potentially vulnerable System/Libraries -
Mageia 7
core/updates
openssl 1.1.0l System/Libraries -
Mageia 7
core/updates
openssl 1.1.0l System/Libraries -
Mageia 7
core/release
openssl 1.1.0j Potentially vulnerable System/Libraries -
Mageia 7
core/updates
compat-openssl10 1.0.2u System/Libraries -
Mageia 7
core/updates
compat-openssl10 1.0.2t Potentially vulnerable System/Libraries -
Mageia 7
core/release
compat-openssl10 1.0.2r Potentially vulnerable System/Libraries -
Mageia Cauldron
core/release
openssl 1.1.1g System/Libraries -
Mageia Cauldron
core/release
compat-openssl10 1.0.2u System/Libraries -
Manjaro Stable
core
openssl 1.1.1.g - -
Manjaro Stable
core
openssl-1.0 1.0.2.u - -
Manjaro Testing
core
openssl 1.1.1.g - -
Manjaro Testing
core
openssl-1.0 1.0.2.u - -
Manjaro Unstable
core
openssl 1.1.1.g - -
Manjaro Unstable
core
openssl-1.0 1.0.2.u - -
MSYS2 mingw
x86_64
mingw-w64-x86_64-openssl 1.1.1.g - alexpux@gmail.com
MSYS2 mingw
i686
mingw-w64-i686-openssl 1.1.1.g - alexpux@gmail.com
MSYS2 msys2
x86_64
libopenssl 1.1.1.g libraries alexpux@gmail.com
MSYS2 msys2
x86_64
openssl 1.1.1.g - alexpux@gmail.com
MSYS2 msys2
x86_64
openssl-devel 1.1.1.g development alexpux@gmail.com
MSYS2 msys2
i686
libopenssl 1.1.1.g libraries alexpux@gmail.com
MSYS2 msys2
i686
openssl 1.1.1.g - alexpux@gmail.com
MSYS2 msys2
i686
openssl-devel 1.1.1.g development alexpux@gmail.com
nixpkgs stable openssl 1.1.1g - simons@cryp.to
nixpkgs stable openssl 1.0.2u - simons@cryp.to
nixpkgs unstable openssl 1.1.1g - simons@cryp.to
nixpkgs unstable openssl 1.0.2u - simons@cryp.to
OpenBSD Ports security/openssl/1.1 1.1.1g security ports@openbsd.org
OpenBSD Ports security/openssl/1.0.2 1.0.2u security ports@openbsd.org
openEuler 20.03
source
openssl 1.1.1d Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
openssl 1.0.2u System/Security -
OpenIndiana packages
hipster
openssl 1.0.2t Potentially vulnerable System/Security -
OpenIndiana packages
hipster
openssl 1.0.2s Potentially vulnerable System/Security -
OpenMandriva 3.0
main/updates
openssl 1.0.2r Potentially vulnerable System/Libraries cris@beebgames.com
OpenMandriva 3.0
main/release
openssl 1.0.2g Potentially vulnerable System/Libraries tpgxyz@gmail.com
OpenMandriva 4.0
main/release
openssl 1.1.1c Potentially vulnerable System/Libraries bero@lindev.ch
OpenMandriva 4.0
main/release
openssl 1.1.1b Potentially vulnerable System/Libraries bero@lindev.ch
OpenMandriva 4.0
main/release
openssl10 1.0.2r Potentially vulnerable System/Libraries nobodydead@gmail.com
OpenMandriva 4.1
main/release
openssl 1.1.1c Potentially vulnerable System/Libraries nobodydead@gmail.com
OpenMandriva 4.1
main/release
openssl10 1.0.2r Potentially vulnerable System/Libraries nobodydead@gmail.com
OpenMandriva Rolling
main/release
openssl 1.1.1f Potentially vulnerable System/Libraries bero@lindev.ch
OpenMandriva Rolling
main/release
openssl10 1.0.2r Potentially vulnerable System/Libraries nobodydead@gmail.com
OpenMandriva Cooker
main/release
openssl 3.0.0 System/Libraries bero@lindev.ch
OpenMandriva Cooker
main/release
openssl 1.1.1g System/Libraries bero@lindev.ch
OpenMandriva Cooker
main/release
openssl10 1.0.2r Potentially vulnerable System/Libraries nobodydead@gmail.com
OpenPKG openssl11 1.1.1g SSL -
OpenPKG openssl11-threads 1.1.1g SSL -
OpenPKG openssl-threads 1.0.2u SSL -
OpenPKG openssl 1.0.2u SSL -
openSUSE Leap 42.3
main/oss
openssl 1.0.2j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
updates/oss
openssl 1.0.2j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
updates/oss
openssl 1.0.2j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
updates/oss
openssl 1.0.2j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
updates/oss
openssl 1.0.2j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
updates/oss
openssl 1.0.2j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
updates/oss
openssl 1.0.2j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
updates/oss
openssl 1.0.2j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
updates/oss
openssl 1.0.2j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
updates/oss
openssl 1.0.2j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
updates/oss
openssl 1.0.2j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
main/oss
compat-openssl098 0.9.8j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
updates/oss
compat-openssl098 0.9.8j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
updates/oss
compat-openssl098 0.9.8j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 42.3
updates/oss
compat-openssl098 0.9.8j Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl 1.1.0i Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl 1.1.0i Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl-1_1 1.1.0i Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl-1_1 1.1.0i Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl-1_1 1.1.0i Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl-1_1 1.1.0i Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl-1_1 1.1.0i Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl-1_1 1.1.0i Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
main/oss
openssl 1.1.0h Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
main/oss
openssl-1_1 1.1.0h Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl-1_1 1.1.0h Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl-1_1 1.1.0h Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl-1_0_0 1.0.2p Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl-1_0_0 1.0.2p Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl-1_0_0 1.0.2p Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl-1_0_0 1.0.2p Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl-1_0_0 1.0.2p Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
main/oss
openssl-1_0_0 1.0.2n Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.0
updates/oss
openssl-1_0_0 1.0.2n Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.1
main/oss
openssl 1.1.0i Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.1
main/oss
openssl-1_1 1.1.0i Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.1
updates/oss
openssl-1_1 1.1.0i Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.1
updates/oss
openssl-1_1 1.1.0i Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.1
main/oss
openssl-1_0_0 1.0.2p Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.1
updates/oss
openssl-1_0_0 1.0.2p Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.1
updates/oss
openssl-1_0_0 1.0.2p Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.1
updates/oss
openssl-1_0_0 1.0.2p Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.1
updates/oss
openssl-1_0_0 1.0.2p Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.2
main/oss
openssl 1.1.1d Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.2
main/oss
openssl-1_1 1.1.1d Potentially vulnerable Productivity/Networking/Security -
openSUSE Leap 15.2
main/oss
openssl-1_0_0 1.0.2p Potentially vulnerable Productivity/Networking/Security -
openSUSE Tumbleweed openssl 1.1.1g Productivity/Networking/Security -
openSUSE Tumbleweed openssl-1_1 1.1.1g Productivity/Networking/Security -
openSUSE Tumbleweed openssl-1_0_0 1.0.2u Productivity/Networking/Security -
OpenWrt 17.01 x86_64
base
libopenssl 1.0.2t Potentially vulnerable libs cotequeiroz@gmail.com
OpenWrt 17.01 x86_64
base
openssl-util 1.0.2t Potentially vulnerable utils cotequeiroz@gmail.com
OpenWrt 18.06 x86_64
base
libopenssl 1.0.2u libs cotequeiroz@gmail.com
OpenWrt 18.06 x86_64
base
openssl-util 1.0.2u utils cotequeiroz@gmail.com
OpenWrt 19.07 x86_64
base
libopenssl-conf 1.1.1g libs cotequeiroz@gmail.com
OpenWrt 19.07 x86_64
base
libopenssl-devcrypto 1.1.1g libs cotequeiroz@gmail.com
OpenWrt 19.07 x86_64
base
libopenssl-padlock 1.1.1g libs cotequeiroz@gmail.com
OpenWrt 19.07 x86_64
base
libopenssl1.1 1.1.1g libs cotequeiroz@gmail.com
OpenWrt 19.07 x86_64
base
openssl-util 1.1.1g utils cotequeiroz@gmail.com
OS4Depot libopenssl 1.1.1c Potentially vulnerable development/library/misc -
Parabola
core
openssl 1.1.1.g - -
Parabola
core
openssl-1.0 1.0.2.u - -
Pardus
updates/main
openssl 1.1.0k Potentially vulnerable libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Pardus
main
openssl 1.1.0j Potentially vulnerable libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Pardus
updates/main
openssl 1.1.0j Potentially vulnerable libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Pardus
updates/main
openssl 1.1.0f Potentially vulnerable libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Pardus
updates/main
openssl1.0 1.0.2s Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Pardus
main
openssl1.0 1.0.2r Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Pardus
updates/main
openssl1.0 1.0.2r Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Pardus
updates/main
openssl1.0 1.0.2q Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Pardus
updates/main
openssl1.0 1.0.2l Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Parrot
main
openssl 1.1.1g libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Parrot
main
openssl1.0 1.0.2q Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
PCLinuxOS openssl 1.1.1g System/Libraries -
PCLinuxOS openssl 1.1.0k Potentially vulnerable System/Libraries -
PCLinuxOS openssl 1.1.0j Potentially vulnerable System/Libraries -
PCLinuxOS openssl 1.0.2m Potentially vulnerable System/Libraries -
PCLinuxOS openssl0.9.8 0.9.8r Potentially vulnerable System/Libraries -
PCLinuxOS openssl0.9.8 0.9.8r Potentially vulnerable System/Libraries -
PCLinuxOS openssl0.9.8 0.9.8r Potentially vulnerable System/Libraries -
Pisi Linux
core
openssl 1.1.1g app:console admins@pisilinux.org
pkgsrc current security/openssl 1.1.1g security pkgsrc-users@netbsd.org
PLD Linux openssl 1.1.1g - -
PureOS Amber openssl 1.1.1c Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
PureOS Amber openssl1.0 1.0.2q Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
PureOS landing openssl 1.1.1g misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Raspbian Oldstable
main
openssl 1.1.0l libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Raspbian Oldstable
main
openssl1.0 1.0.2u misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Raspbian Stable
main
openssl 1.1.1d Potentially vulnerable libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Raspbian Stable
main
openssl1.0 1.0.2q Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Raspbian Testing
main
openssl 1.1.1g libs pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Raspbian Testing
main
openssl1.0 1.0.2q Potentially vulnerable misc pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Ravenports openssl-devel 1.1.1g security fallback-mnt-ravenports@repology
Ravenports openssl 1.0.2u security fallback-mnt-ravenports@repology
Rosa 2014.1
main/testing
openssl 1.0.2q Potentially vulnerable - -
Rosa 2014.1
main/updates
openssl 1.0.2q Potentially vulnerable - -
Rosa 2014.1
main/release
openssl 1.0.1i Potentially vulnerable - -
Rosa 2014.1
contrib/release
openssl0.9.8 0.9.8zb Potentially vulnerable - -
Rosa 2014.1
contrib/updates
openssl0.9.8 0.9.8zg Potentially vulnerable - -
Rosa 2016.1
main/testing
openssl 1.0.2u - -
Rosa 2016.1
main/updates
openssl 1.0.2u - -
Rosa 2016.1
main/release
openssl 1.0.2k Potentially vulnerable - -
Rosa 2016.1
contrib/release
openssl0.9.8 0.9.8zg Potentially vulnerable - -
Rosa 2019.1
main/release
openssl 1.1.1g System/Libraries alexander@mezon.ru
Rosa 2019.1
main/release
openssl1.0 1.0.2u System/Libraries alexander@mezon.ru
Rosa Server 6.9
base/release
openssl 1.0.1e Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
openssl 1.0.1e Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
openssl 1.0.1e Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
openssl 1.0.1e Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
openssl098e 0.9.8e Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
openssl098e 0.9.8e Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
openssl 1.0.1e Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Rosa Server 7.3
base/release
openssl098e 0.9.8e Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Rosa Server 7.5
base/release
openssl 1.0.2k Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Rosa Server 7.5
base/release
openssl 1.0.1e Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Rosa Server 7.5
base/release
openssl098e 0.9.8e Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Rosa Server 7.5
base/release
openssl098e 0.9.8e Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Scientific Linux 7.x openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.2k Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl 1.0.1e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl098e 0.9.8e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl098e 0.9.8e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl098e 0.9.8e Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x openssl098e 0.9.8e Potentially vulnerable System Environment/Libraries -
Scoop
main
openssl 1.1.1g - -
Scoop
versions
openssl-light 1.1.1g - -
Scoop
versions
openssl10-light 1.0.2u - -
Scoop
versions
openssl10 1.0.2u - -
Slackware 14.2
patches
openssl 1.0.2u - volkerdi@slackware.com
Slackware 14.2
patches
openssl-solibs 1.0.2u - volkerdi@slackware.com
Slackware 14.2
slackware
openssl 1.0.2h Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
openssl-solibs 1.0.2h Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
openssl 1.1.1g - volkerdi@slackware.com
Slackware current
slackware
openssl-solibs 1.1.1g - volkerdi@slackware.com
Slackware current
slackware
openssl10 1.0.2u - volkerdi@slackware.com
Slackware current
slackware
openssl10-solibs 1.0.2u - volkerdi@slackware.com
Slackware64 14.2
patches
openssl 1.0.2u - volkerdi@slackware.com
Slackware64 14.2
patches
openssl-solibs 1.0.2u - volkerdi@slackware.com
Slackware64 14.2
slackware64
openssl 1.0.2h Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
openssl-solibs 1.0.2h Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
openssl 1.1.1g - volkerdi@slackware.com
Slackware64 current
slackware64
openssl-solibs 1.1.1g - volkerdi@slackware.com
Slackware64 current
slackware64
openssl10 1.0.2u - volkerdi@slackware.com
Slackware64 current
slackware64
openssl10-solibs 1.0.2u - volkerdi@slackware.com
Slackwarearm 14.2
patches
openssl 1.0.2u - volkerdi@slackware.com
Slackwarearm 14.2
patches
openssl-solibs 1.0.2u - volkerdi@slackware.com
Slackwarearm 14.2
slackware
openssl 1.0.2h Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
openssl-solibs 1.0.2h Potentially vulnerable - volkerdi@slackware.com
Slackwarearm current
slackware
openssl 1.1.1g - volkerdi@slackware.com
Slackwarearm current
slackware
openssl-solibs 1.1.1g - volkerdi@slackware.com
Slackwarearm current
slackware
openssl10 1.0.2u - volkerdi@slackware.com
Slackwarearm current
slackware
openssl10-solibs 1.0.2u - volkerdi@slackware.com
SliTaz Cooking openssl 1.0.2u security pascal.bellard@slitaz.org
SliTaz Cooking libcrypto 1.0.2u security pascal.bellard@slitaz.org
SliTaz Cooking libcrypto-dev 1.0.2u development pascal.bellard@slitaz.org
SliTaz Cooking libssl 1.0.2u security pascal.bellard@slitaz.org
SliTaz Cooking openssl-dev 1.0.2u development pascal.bellard@slitaz.org
SliTaz Next openssl 1.1.0h Potentially vulnerable security pascal.bellard@slitaz.org
SliTaz Next openssl-dev 1.1.0h Potentially vulnerable development pascal.bellard@slitaz.org
SliTaz Next openssl10 1.0.2o Potentially vulnerable security pascal.bellard@slitaz.org
SliTaz Next openssl10-dev 1.0.2o Potentially vulnerable development pascal.bellard@slitaz.org
Solus openssl 1.0.2u system.base pyu@riseup.net
Solus openssl-32bit 1.0.2u emul32 pyu@riseup.net
Solus openssl-32bit-dbginfo 1.0.2u debug pyu@riseup.net
Solus openssl-32bit-devel 1.0.2u programming.devel pyu@riseup.net
Solus openssl-dbginfo 1.0.2u debug pyu@riseup.net
Solus openssl-devel 1.0.2u system.devel pyu@riseup.net
Sparky Stable
core
openssl 1.0.2l Potentially vulnerable utils pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be
Sparky Testing
core
openssl 1.0.2l Potentially vulnerable utils pkg-openssl-devel@lists.alioth.debian.org, christoph.martin@uni-mainz.de, kurt@roeckx.be
T2 SDE openssl 1.0.2u base/library rene@t2-project.org
Termux openssl 1.1.1g - termux@termux
Trisquel 6.0
toutatis/main
openssl 1.0.1 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Trisquel 6.0
toutatis-updates/main
openssl 1.0.1 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Trisquel 6.0
toutatis/main
openssl098 0.9.8o Potentially vulnerable universe/utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Trisquel 6.0
toutatis-updates/main
openssl098 0.9.8o Potentially vulnerable universe/utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Trisquel 7.0
belenos-updates/main
openssl 1.0.2g Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Trisquel 7.0
belenos/main
openssl 1.0.1f Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Trisquel 7.0
belenos/main
openssl098 0.9.8o Potentially vulnerable universe/utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Trisquel 7.0
belenos-updates/main
openssl098 0.9.8o Potentially vulnerable universe/utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Trisquel 7.0 backports
belenos-backports/main
openssl 1.0.2g Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Trisquel 8.0
flidas/main
openssl 1.0.2g Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Trisquel 8.0
flidas-updates/main
openssl 1.0.2g Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Ubuntu 12.04
precise/main
openssl 1.0.1 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Ubuntu 12.04
precise-updates/main
openssl 1.0.1 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Ubuntu 12.04
precise/universe
openssl098 0.9.8o Potentially vulnerable universe/utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Ubuntu 12.04
precise-updates/universe
openssl098 0.9.8o Potentially vulnerable universe/utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Ubuntu 14.04
trusty/main
openssl 1.0.1f Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Ubuntu 14.04
trusty-updates/main
openssl 1.0.1f Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Ubuntu 14.04
trusty/universe
openssl098 0.9.8o Potentially vulnerable universe/utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Ubuntu 14.04
trusty-updates/universe
openssl098 0.9.8o Potentially vulnerable universe/utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Ubuntu 16.04
xenial/main
openssl 1.0.2g Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Ubuntu 16.04
xenial-updates/main
openssl 1.0.2g Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be
Ubuntu 18.04
bionic-updates/main
openssl 1.1.1 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Ubuntu 18.04
bionic/main
openssl 1.1.0g Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Ubuntu 18.04
bionic/main
openssl1.0 1.0.2n Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Ubuntu 18.04
bionic-updates/main
openssl1.0 1.0.2n Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Ubuntu 19.10
eoan/main
openssl 1.1.1c Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Ubuntu 19.10
eoan-updates/main
openssl 1.1.1c Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Ubuntu 20.04
focal/main
openssl 1.1.1f Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
Ubuntu 20.10
groovy/main
openssl 1.1.1f Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com, christoph.martin@uni-mainz.de, kurt@roeckx.be, sebastian@breakpoint.cc
UnitedRPMs Fedora 30
release
openssl-freeworld 1.1.1g System Environment/Libraries -
UnitedRPMs Fedora 31
release
openssl-freeworld 1.1.1g System Environment/Libraries -
UnitedRPMs Fedora 32
release
openssl-freeworld 1.1.1g System Environment/Libraries -
UnitedRPMs Fedora 33
release
openssl-freeworld 1.1.1g System Environment/Libraries -
Vcpkg openssl 1.1.1d Potentially vulnerable - -
Wikidata OpenSSL 1.1.1g - -

Absent in repositories

  • antiX-16
  • antiX-17
  • antiX-19
  • Arch Testing
  • Ataraxia Linux
  • BlackArch
  • BlackBox 6
  • BlackBox 7
  • BunsenLabs Hydrogen
  • BunsenLabs Hydrogen/Jessie Backports
  • BunsenLabs Helium
  • BunsenLabs Helium/Stretch Backports
  • Calculate
  • Carbs Linux
  • Chakra Testing
  • CPAN
  • MetaCPAN
  • CRAN
  • crates.io
  • Deb Multimedia Unstable
  • Debian Stable Backports
  • Debian Experimental
  • ELRepo el7
  • ELRepo el7 Testing
  • EPEL 6
  • EPEL 8
  • F-Droid
  • Gentoo overlay GURU
  • Gentoo overlay Pentoo
  • GNU Elpa
  • Hackage
  • Homebrew Casks
  • Homebrew tap Brewsci/bio
  • Hyperbola
  • just-install
  • KaOS Build
  • KDE neon Dev Stable
  • KDE neon Dev Unstable
  • KDE neon Experimental
  • KDE neon User
  • KDE neon User LTS
  • KISS Linux Community
  • KISS Linux Main
  • Libregamewiki
  • Linux Mint 17
  • Linux Mint 17.1
  • Linux Mint 17.2
  • Linux Mint 17.3
  • Linux Mint 18
  • Linux Mint 18.1
  • Linux Mint 18.2
  • Linux Mint 18.3
  • Linux Mint 19
  • Linux Mint 19.1
  • Linux Mint 19.2
  • Linux Mint 19.3
  • LuaRocks
  • Maemo Fremantle
  • MELPA
  • MX Linux MX-15
  • MX Linux MX-15 Testing
  • MX Linux MX-16
  • MX Linux MX-17
  • MX Linux MX-17 Testing
  • MX Linux MX-19
  • MX Linux MX-19 Testing
  • NeuroDebian data
  • NeuroDebian Debian 8
  • NeuroDebian Debian 9
  • NeuroDebian Debian 10
  • NeuroDebian Debian Unstable
  • NeuroDebian Ubuntu 14.04
  • NeuroDebian Ubuntu 16.04
  • NeuroDebian Ubuntu 18.04
  • NeuroDebian Ubuntu 19.04
  • Npackd Stable
  • Npackd Stable64
  • Npackd Unstable
  • openSUSE Education Tumbleweed
  • openSUSE Emulators Tumbleweed
  • openSUSE Games Tumbleweed
  • openSUSE Graphics Tumbleweed
  • openSUSE Hardware:SDR Tumbleweed
  • openSUSE Multimedia:Apps Tumbleweed
  • openSUSE Multimedia:Libs Tumbleweed
  • openSUSE Network Tumbleweed
  • openSUSE Science Tumbleweed
  • openSUSE Security Tumbleweed
  • PackMan openSUSE Leap 42.3
  • PackMan openSUSE Leap 15.0
  • PackMan openSUSE Leap 15.1
  • PackMan openSUSE Leap 15.2
  • PackMan openSUSE Tumbleweed
  • PackMan SLE 12
  • PackMan SLE 15
  • Parabola Testing
  • Pisi Linux Contrib
  • ReactOS rapps
  • RPM Fusion EL 6
  • RPM Fusion EL 7
  • RPM Fusion EL 8
  • RPM Fusion Fedora 28
  • RPM Fusion Fedora 29
  • RPM Fusion Fedora 30
  • RPM Fusion Fedora 31
  • RPM Fusion Fedora Rawhide
  • RPM Sphere
  • RubyGems
  • Sabayon
  • Sabayon for-gentoo
  • Salix 14.2
  • Siduction
  • Siduction Experimental
  • SlackBuilds
  • Stackage LTS Haskell
  • Stackage Nightly
  • Tails stable
  • Tails devel
  • Trisquel 6.0 backports
  • Trisquel 8.0 backports
  • Ubuntu 12.04 Backports
  • Ubuntu 14.04 Backports
  • Ubuntu 16.04 Backports
  • Ubuntu 18.04 Backports
  • Ubuntu 19.10 Backports
  • Ubuntu 19.10 Proposed
  • Ubuntu 20.04 Proposed
  • Ubuntu 20.10 Proposed
  • Void Linux x86_64
  • Whonix
  • Whonix Developers
  • winget
  • YACP