Versions Packages Information History CVEs Related Badges Report

Versions for patch

258 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
system
patch 2.7.6 Potentially vulnerable - sheila@vulpine.house
Adélie Linux current
system
patch-dbg 2.7.6 Potentially vulnerable - sheila@vulpine.house
Adélie Linux current
system
patch-doc 2.7.6 Potentially vulnerable - sheila@vulpine.house
AIX Open Source Packages patch 2.7.6 Potentially vulnerable - -
AIX Open Source Packages patch 2.7.5 Potentially vulnerable - -
AIX Open Source Packages patch 2.7.3 Potentially vulnerable - -
AIX Open Source Packages patch 2.7.2 Potentially vulnerable - -
AIX Open Source Packages patch 2.7.1 Potentially vulnerable - -
AIX Open Source Packages patch 2.7 Potentially vulnerable - -
AIX Open Source Packages patch 2.6.1 Potentially vulnerable - -
AIX Open Source Packages patch 2.6 Potentially vulnerable - -
AIX Open Source Packages patch 2.5.9 Potentially vulnerable - -
AIX Toolbox patch 2.7.6 Potentially vulnerable Development/Tools -
AlmaLinux 8
BaseOS
patch 2.7.6 Potentially vulnerable Development/Tools packager@cloudlinux.com
AlmaLinux 9
AppStream
patch 2.7.6 Potentially vulnerable Unspecified packager@almalinux.org
Alpine Linux 3.8
main
patch 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
patch-doc 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
patch 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
patch-doc 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
patch 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
patch-doc 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
patch-doc 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
patch 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
patch-doc 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
patch 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
patch 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
patch-doc 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
patch-doc 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
patch 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
patch 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
patch-doc 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
patch-doc 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
patch 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
patch-doc 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
patch 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
patch 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
patch-doc 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
patch 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
patch-doc 2.7.6 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 patch 2.7.6.0.24.76e7 Text tools ldv@altlinux.org
ALT Linux p10 patch 2.7.6.0.27.7623 Text tools ldv@altlinux.org
ALT Sisyphus patch 2.7.6.0.27.7623 Text tools ldv@altlinux.org
Amazon Linux 1
updates
patch 2.7.1 Potentially vulnerable Development/Tools -
Amazon Linux 1
main
patch 2.7.1 Potentially vulnerable Development/Tools -
Amazon Linux 1
updates
patch 2.7.1 Potentially vulnerable Development/Tools -
Amazon Linux 2 patch 2.7.1 Potentially vulnerable Development/Tools -
Amazon Linux 2 patch 2.7.1 Potentially vulnerable Development/Tools -
Amazon Linux 2 patch 2.7.1 Potentially vulnerable Development/Tools -
Amazon Linux 2 patch 2.7.1 Potentially vulnerable Development/Tools -
Amazon Linux 2 patch 2.7.1 Potentially vulnerable Development/Tools -
Apertis v2021
v2021/development
patch 2.7.6 Potentially vulnerable - gcs@debian.org
Apertis v2022
v2022/development
patch 2.7.6 Potentially vulnerable - gcs@debian.org
Apertis v2023
v2023/development
patch 2.7.6 Potentially vulnerable - gcs@debian.org
Apertis v2024 Development
v2024pre/development
patch 2.7.6 Potentially vulnerable - gcs@debian.org
Arch
core
patch 2.7.6 Potentially vulnerable - -
Arch Linux 32 i486
core
patch 2.7.6 Potentially vulnerable - -
Arch Linux 32 i686
core
patch 2.7.6 Potentially vulnerable - -
Arch Linux 32 pentium4
core
patch 2.7.6 Potentially vulnerable - -
Arch Linux ARM aarch64
core
patch 2.7.6 Potentially vulnerable - -
ArchPOWER powerpc patch 2.7.6 Potentially vulnerable - -
ArchPOWER powerpc64le patch 2.7.6 Potentially vulnerable - -
ArchPOWER riscv64 patch 2.7.6 Potentially vulnerable - -
AUR patch-git 2.7.6.r29.gc835ecc - chocobo1@aur
Artix
system
patch 2.7.6 Potentially vulnerable - -
Buildroot 2023.02.x patch 2.7.6 Potentially vulnerable - -
Buildroot 2023.05.x patch 2.7.6 Potentially vulnerable - -
Buildroot master patch 2.7.6 Potentially vulnerable - -
CentOS 6
os
patch 2.6 Potentially vulnerable Development/Tools -
CentOS 7
os
patch 2.7.1 Potentially vulnerable Development/Tools -
CentOS 8
BaseOS
patch 2.7.6 Potentially vulnerable Development/Tools bugs@centos.org
CentOS Stream 8
BaseOS
patch 2.7.6 Potentially vulnerable Development/Tools bugs@centos.org
CentOS Stream 9
AppStream
patch 2.7.6 Potentially vulnerable Unspecified builder@centos.org
Chocolatey GNU Patch for Windows 2.5.9 Potentially vulnerable - -
CRUX 3.4
core
patch 2.7.6.17-9c98 - core-ports@crux.nu
CRUX 3.5
core
patch 2.7.6.17-9c98 - core-ports@crux.nu
CRUX 3.6
core
patch 2.7.6.17-9c98 - core-ports@crux.nu
CRUX 3.7
core
patch 2.7.6.17-9c98 - core-ports@crux.nu
Cygwin patch 2.7.6 Potentially vulnerable Devel corinna.vinschen@cygwin
Cygwin patch-debuginfo 2.7.6 Potentially vulnerable Debug corinna.vinschen@cygwin
Debian 10
buster/updates/main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
Debian 10
buster/main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
Debian 11
bullseye/main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
Debian 12
bookworm/main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
Debian 13
trixie/main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
Debian Unstable
sid/main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
Deepin
main
patch 2.7.6 Potentially vulnerable - gcs@debian.org
Devuan 3.0
beowulf/main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
Devuan 4.0
chimaera/main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
Devuan Unstable
unstable/main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
distri patch 2.7.6 Potentially vulnerable - -
Entware
mipselsf-k3.4
patch 2.7.6 Potentially vulnerable devel russell@personaltelco.net
Entware
mipssf-k3.4
patch 2.7.6 Potentially vulnerable devel russell@personaltelco.net
Entware
x64-k3.2
patch 2.7.6 Potentially vulnerable devel russell@personaltelco.net
Entware
aarch64-k3.10
patch 2.7.6 Potentially vulnerable devel russell@personaltelco.net
Entware
armv5sf-k3.2
patch 2.7.6 Potentially vulnerable devel russell@personaltelco.net
Entware
armv7sf-k2.6
patch 2.7.6 Potentially vulnerable devel russell@personaltelco.net
Entware
armv7sf-k3.2
patch 2.7.6 Potentially vulnerable devel russell@personaltelco.net
EuroLinux 8
baseos
patch 2.7.6 Potentially vulnerable Development/Tools -
EuroLinux 8
baseos
patch 2.7.6 Potentially vulnerable Development/Tools -
EuroLinux 9
appstream
patch 2.7.6 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
patch 2.7.6 Potentially vulnerable Unspecified -
Exherbo
arbor
sys-devel/patch 2.7.6 Potentially vulnerable sys-devel fallback-mnt-exherbo@repology
Fedora 26
updates
patch 2.7.6 Potentially vulnerable Development/Tools -
Fedora 26
release
patch 2.7.5 Potentially vulnerable Development/Tools -
Fedora 27
updates
patch 2.7.6 Potentially vulnerable Development/Tools -
Fedora 27
release
patch 2.7.5 Potentially vulnerable Development/Tools -
Fedora 28
updates
patch 2.7.6 Potentially vulnerable Development/Tools -
Fedora 28
release
patch 2.7.6 Potentially vulnerable Development/Tools -
Fedora 29
updates
patch 2.7.6 Potentially vulnerable Development/Tools -
Fedora 29
release
patch 2.7.6 Potentially vulnerable Development/Tools -
Fedora 30
updates
patch 2.7.6 Potentially vulnerable Unspecified -
Fedora 30
release
patch 2.7.6 Potentially vulnerable Unspecified -
Fedora 31
release
patch 2.7.6 Potentially vulnerable Unspecified -
Fedora 32
release
patch 2.7.6 Potentially vulnerable Unspecified -
Fedora 33
release
patch 2.7.6 Potentially vulnerable Unspecified -
Fedora 34
release
patch 2.7.6 Potentially vulnerable Unspecified -
Fedora 35
release
patch 2.7.6 Potentially vulnerable Unspecified -
Fedora 36
release
patch 2.7.6 Potentially vulnerable Unspecified -
Fedora 37
release
patch 2.7.6 Potentially vulnerable Unspecified -
Fedora 38
release
patch 2.7.6 Potentially vulnerable Unspecified -
Fedora 39
development
patch 2.7.6 Potentially vulnerable Unspecified -
Fedora Rawhide
development
patch 2.7.6 Potentially vulnerable Unspecified -
FreeBSD Ports devel/patch 2.7.6 Potentially vulnerable devel danfe@freebsd.org
Gentoo sys-devel/patch 2.7.6 Potentially vulnerable sys-devel base-system@gentoo.org
Gentoo sys-devel/patch 2.7.6 Potentially vulnerable sys-devel base-system@gentoo.org
glaucus patch 2.7.6 Potentially vulnerable - firasuke@glaucuslinux.org
GNU Guix patch 2.7.6 Potentially vulnerable - -
GoboLinux Patch 2.6.1 Potentially vulnerable - -
HaikuPorts master sys-devel/patch 2.7.6 Potentially vulnerable sys-devel -
HaikuPorts master sys-devel/patch 2.7.5 Potentially vulnerable sys-devel -
Homebrew gpatch 2.7.6 Potentially vulnerable - -
HP-UX 11.31
hppa_32
patch 2.7.6 Potentially vulnerable - -
HP-UX 11.31
ia64_64
patch 2.7.6 Potentially vulnerable - -
HP-UX 11.31
hppa_32
patch 2.7.5 Potentially vulnerable - -
HP-UX 11.31
ia64_32
patch 2.7.5 Potentially vulnerable - -
HP-UX 11.31
ia64_64
patch 2.7.5 Potentially vulnerable - -
HP-UX 11.31
hppa_32
patch 2.7.1 Potentially vulnerable - -
IBM i patch-gnu 2.7.5 Potentially vulnerable Unspecified -
Kali Linux Rolling
main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
KaOS
core
patch 2.7.6 Potentially vulnerable - demm@kaosx.us
LiGurOS stable sys-devel/patch 2.7.6 Potentially vulnerable sys-devel base-system@gentoo.org
LiGurOS stable sys-devel/patch 2.7.6 Potentially vulnerable sys-devel base-system@gentoo.org
LiGurOS develop sys-devel/patch 2.7.6 Potentially vulnerable sys-devel base-system@gentoo.org
LiGurOS develop sys-devel/patch 2.7.6 Potentially vulnerable sys-devel base-system@gentoo.org
MacPorts gpatch 2.7.6 Potentially vulnerable devel nomaintainer@macports.org
Mageia 8
core/release
patch 2.7.6 Potentially vulnerable Text tools -
Mageia cauldron
core/release
patch 2.7.6 Potentially vulnerable Text tools -
Manjaro Stable
core
patch 2.7.6 Potentially vulnerable - -
Manjaro Testing
core
patch 2.7.6 Potentially vulnerable - -
Manjaro Unstable
core
patch 2.7.6 Potentially vulnerable - -
MidnightBSD mports devel/patch 2.7.6 Potentially vulnerable devel -
MSYS2 msys2
x86_64
patch 2.7.6 Potentially vulnerable - -
nixpkgs stable 21.11 patch 2.7.6 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 22.05 patch 2.7.6 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 22.11 patch 2.7.6 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 23.05 patch 2.7.6 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable patch 2.7.6 Potentially vulnerable - fallback-mnt-nix@repology
OpenBSD Ports devel/gpatch 2.7.6 Potentially vulnerable devel ports@openbsd.org
openEuler 20.03
source
patch 2.7.6 Potentially vulnerable Unspecified -
openEuler 22.03
source
patch 2.7.6 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
patch 2.7.6 Potentially vulnerable Development/GNU -
openmamba
devel
patch 2.7.6 Potentially vulnerable Applications/Development silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
patch 2.7.6 Potentially vulnerable Text tools bero@lindev.ch
OpenMandriva 4.1
main/release
patch 2.7.6 Potentially vulnerable Text tools nobodydead@gmail.com
OpenMandriva 4.2
main/release
patch 2.7.6 Potentially vulnerable Text tools bero@lindev.ch
OpenMandriva 4.3
main/release
patch 2.7.6 Potentially vulnerable Text tools bero+massbuild@lindev.ch
OpenMandriva Rolling
main/release
patch 2.7.6 Potentially vulnerable Text tools tpgxyz@gmail.com
OpenMandriva Cooker
main/release
patch 2.7.6 Potentially vulnerable Text tools tpgxyz@gmail.com
OpenPKG patch 2.7.6 Potentially vulnerable Patching -
openSUSE Leap 42.3
updates/oss
patch 2.7.5 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Leap 42.3
main/oss
patch 2.7.5 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Leap 15.0
main/oss
patch 2.7.6 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Leap 15.0
updates/oss
patch 2.7.6 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Leap 15.0
updates/sle
patch 2.7.6 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Leap 15.1
updates/sle
patch 2.7.6 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Leap 15.1
main/oss
patch 2.7.6 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Leap 15.2
updates/sle
patch 2.7.6 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Leap 15.2
main/oss
patch 2.7.6 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Leap 15.3
updates/sle
patch 2.7.6 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Leap 15.3
main/oss
patch 2.7.6 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Leap 15.4
main/oss
patch 2.7.6 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Leap 15.4
updates/sle
patch 2.7.6 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Leap 15.5
main/oss
patch 2.7.6 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Leap 15.5
updates/sle
patch 2.7.6 Potentially vulnerable Productivity/Text/Utilities -
openSUSE Tumbleweed
src-oss
patch 2.7.6 Potentially vulnerable Productivity/Text/Utilities -
OpenWrt 17.01 x86_64
packages
patch 2.7.5 Potentially vulnerable devel russell@personaltelco.net
OpenWrt 18.06 x86_64
packages
patch 2.7.6 Potentially vulnerable devel russell@personaltelco.net
OpenWrt 19.07 x86_64
packages
patch 2.7.6 Potentially vulnerable devel russell@personaltelco.net
OpenWrt 21.02 x86_64
packages
patch 2.7.6 Potentially vulnerable devel russell@personaltelco.net
OpenWrt 22.03 x86_64
packages
patch 2.7.6 Potentially vulnerable devel russell@personaltelco.net
OS4Depot patch.lha 2.6.1_01 Potentially vulnerable utility/filetool -
Parabola
core
patch 2.7.6 Potentially vulnerable - -
Pardus 21
main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
Parrot
parrot-updates/main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
Parrot
parrot/main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
PCLinuxOS patch 2.7.6 Potentially vulnerable Text tools -
Pisi Linux
core
patch 2.7.6 Potentially vulnerable app:console admins@pisilinux.org
pkgsrc current devel/patch 2.7.6 Potentially vulnerable devel pkgsrc-users@netbsd.org
PLD Linux patch 2.7.6 Potentially vulnerable - -
PureOS Amber patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
PureOS landing patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
Raspbian Oldstable
main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
Raspbian Stable
main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
Raspbian Testing
main
patch 2.7.6 Potentially vulnerable vcs gcs@debian.org
Ravenports patch 2.7.6 Potentially vulnerable devel fallback-mnt-ravenports@repology
Rocky Linux 8
BaseOS
patch 2.7.6 Potentially vulnerable Development/Tools infrastructure@rockylinux.org
Rocky Linux 9
AppStream
patch 2.7.6 Potentially vulnerable Unspecified releng@rockylinux.org
Rosa 2014.1
main/updates
patch 2.7.5 Potentially vulnerable - -
Rosa 2014.1
main/release
patch 2.7.1 Potentially vulnerable - -
Rosa 2016.1
main/updates
patch 2.7.6 Potentially vulnerable - -
Rosa 2016.1
main/release
patch 2.7.5 Potentially vulnerable - -
Rosa 2021.1
main/release
patch 2.7.6 Potentially vulnerable Text tools alexander@mezon.ru
Rosa Server 6.9
base/release
patch 2.6 Potentially vulnerable Development/Tools andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
patch 2.7.1 Potentially vulnerable Development/Tools alex2048@mail.ru
Rosa Server 7.5
base/release
patch 2.7.1 Potentially vulnerable Development/Tools alex2048@mail.ru
SageMath stable patch 2.7.5 Potentially vulnerable - -
SageMath development patch 2.7.5 Potentially vulnerable - -
Scientific Linux 7.x patch 2.7.1 Potentially vulnerable Development/Tools -
Scientific Linux 7.x patch 2.7.1 Potentially vulnerable Development/Tools -
Scientific Linux 7.x patch 2.7.1 Potentially vulnerable Development/Tools -
Scientific Linux 7.x patch 2.7.1 Potentially vulnerable Development/Tools -
Scientific Linux 7.x patch 2.7.1 Potentially vulnerable Development/Tools -
Scoop
main
patch 2.6.1 Potentially vulnerable - -
Slackware 14.2
patches
patch 2.7.6 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
patch 2.7.5 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
patch 2.7.6 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
patch 2.7.6 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
patches
patch 2.7.6 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
patch 2.7.5 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
patch 2.7.6 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
patch 2.7.6 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
patches
patch 2.7.6 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
patch 2.7.5 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
patch 2.7.6 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking patch 2.7.6 Potentially vulnerable utilities pankso@slitaz.org
SliTaz Next patch 2.7.6 Potentially vulnerable utilities devel@slitaz.org
SliTaz Next patch 2.7.6 Potentially vulnerable utilities devel@slitaz.org
Solus patch 2.7.6 Potentially vulnerable system.devel joshua@streambits.io
Solus patch-dbginfo 2.7.6 Potentially vulnerable debug joshua@streambits.io
Spack patch 2.7.6 Potentially vulnerable - fallback-mnt-spack@repology
T2 SDE patch 2.7.6 Potentially vulnerable base/development rene@t2-project.org
Termux patch 2.7.6 Potentially vulnerable - termux@github
Trisquel 10.0
nabia/main
patch 2.7.6 Potentially vulnerable utils gcs@debian.org
Trisquel 11.0
aramo/main
patch 2.7.6 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
UBI 8
baseos
patch 2.7.6 Potentially vulnerable Development/Tools -
Ubuntu 14.04
trusty-updates/main
patch 2.7.1 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty/main
patch 2.7.1 Potentially vulnerable utils gcs@debian.org
Ubuntu 16.04
xenial/main
patch 2.7.5 Potentially vulnerable utils gcs@debian.org
Ubuntu 16.04
xenial-updates/main
patch 2.7.5 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic/main
patch 2.7.6 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic-updates/main
patch 2.7.6 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/main
patch 2.7.6 Potentially vulnerable utils gcs@debian.org
Ubuntu 22.04
jammy/main
patch 2.7.6 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 23.04
lunar/main
patch 2.7.6 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 23.10
mantic/main
patch 2.7.6 Potentially vulnerable utils ubuntu-devel-discuss@lists.ubuntu.com
Void Linux x86_64
x86_64
patch 2.7.6 Potentially vulnerable - xtraeme@voidlinux.org
Wikidata patch 2.7.6 Potentially vulnerable - -
yiffOS Knot patch 2.7.6 Potentially vulnerable - evie@eviee.gay