Versions Packages Information History CVEs Related Badges Report

Versions for procps-ng

450 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
system
procps-doc 3.3.16 - awilfox@adelielinux.org
Adélie Linux current
system
libproc 3.3.16 - awilfox@adelielinux.org
Adélie Linux current
system
procps-lang 3.3.16 - awilfox@adelielinux.org
Adélie Linux current
system
procps-dbg 3.3.16 - awilfox@adelielinux.org
Adélie Linux current
system
procps-dev 3.3.16 - awilfox@adelielinux.org
Adélie Linux current
system
procps 3.3.16 - awilfox@adelielinux.org
AlmaLinux 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System packager@almalinux.org
Alpine Linux 3.8
main
libproc 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
procps-dev 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
procps 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
procps-doc 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
procps-lang 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
procps-lang 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
procps 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
procps-dev 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
procps-doc 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
libproc 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
procps-doc 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
procps-lang 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
libproc 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
procps-dev 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
procps 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
procps 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
procps-lang 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
procps-doc 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
procps-dev 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
libproc 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
libproc 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
procps-dev 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
procps-doc 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
procps 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
procps-lang 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
procps-doc 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
procps 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
procps-lang 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
libproc 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
procps-dev 3.3.16 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
libproc 3.3.17 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
procps-doc 3.3.17 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
procps 3.3.17 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
procps-lang 3.3.17 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
procps-dev 3.3.17 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
libproc 3.3.17 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
procps-lang 3.3.17 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
procps-dev 3.3.17 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
procps 3.3.17 - ncopa@alpinelinux.org
Alpine Linux 3.15
main
procps-doc 3.3.17 - ncopa@alpinelinux.org
Alpine Linux Edge
main
procps-lang 3.3.17 - ncopa@alpinelinux.org
Alpine Linux Edge
main
procps-dev 3.3.17 - ncopa@alpinelinux.org
Alpine Linux Edge
main
procps 3.3.17 - ncopa@alpinelinux.org
Alpine Linux Edge
main
libproc 3.3.17 - ncopa@alpinelinux.org
Alpine Linux Edge
main
procps-doc 3.3.17 - ncopa@alpinelinux.org
ALT Linux p9 procps 3.3.16 Monitoring sem@altlinux.org
ALT Linux p10 procps 3.3.17 Monitoring sem@altlinux.org
ALT Sisyphus procps 3.3.17 Monitoring sem@altlinux.org
Amazon Linux 2 procps-ng 3.3.10 Potentially vulnerable Applications/System -
Amazon Linux 2 procps-ng 3.3.10 Potentially vulnerable Applications/System -
Amazon Linux 2 procps-ng 3.3.10 Potentially vulnerable Applications/System -
Amazon Linux 2 procps-ng 3.3.10 Potentially vulnerable Applications/System -
antiX-19
dev
procps 3.3.17 dev csmall@debian.org
antiX-19
nosystemd
procps 3.3.17 nosystemd csmall@debian.org
antiX-21
nosystemd
procps 3.3.17 nosystemd csmall@debian.org
antiX-21
dev
procps 3.3.17 dev csmall@debian.org
Apertis v2020
v2020/target
procps 3.3.15 Potentially vulnerable main csmall@debian.org
Apertis v2021
v2021/target
procps 3.3.15 Potentially vulnerable main csmall@debian.org
Apertis v2022
v2022/target
procps 3.3.17 main csmall@debian.org
Apertis v2023 Development
v2023dev1/target
procps 3.3.17 main csmall@debian.org
Arch
core
procps-ng 3.3.17 - -
Arch
multilib
lib32-procps-ng 3.3.17 - -
Arch Linux 32 i486
core
procps-ng 3.3.17 - -
Arch Linux 32 i686
core
procps-ng 3.3.17 - -
Arch Linux 32 pentium4
core
procps-ng 3.3.17 - -
Arch Linux ARM aarch64
core
procps-ng 3.3.17 - -
Arch Linux ARM armv7h
core
procps-ng 3.3.17 - -
ArchPOWER powerpc procps-ng 3.3.17 - -
ArchPOWER powerpc64le procps-ng 3.3.17 - -
ArchPOWER riscv64 procps-ng 3.3.17 - -
AUR procps-ng-git 4.0.0.r54.g6e78355d - xorg@aur
AUR procps-ng-nosystemd 3.3.17 - tz86@aur
AUR procps-ng-static 3.3.15 Potentially vulnerable - huitseeker@aur
Artix
system
procps-ng 3.3.17 - -
Astra Orel Stable
main
procps 3.3.12 Potentially vulnerable admin csmall@debian.org
Ataraxia GNU/Linux procps-ng 3.3.17 base -
Carbs Linux
extra
procps-ng 4.0.0 - cem@carbslinux.org
CentOS 7
os
procps-ng 3.3.10 Potentially vulnerable Applications/System -
CentOS 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 9
BaseOS
procps-ng 3.3.17 Unspecified builder@centos.org
CentOS Stream 9
BaseOS
procps-ng 3.3.17 Unspecified builder@centos.org
CRUX 3.4
core
procps 3.3.15 Potentially vulnerable - core-ports@crux.nu
CRUX 3.5
core
procps 3.3.16 - core-ports@crux.nu
CRUX 3.6
core
procps 3.3.17 - core-ports@crux.nu
Cygwin procps-ng-debuginfo 3.3.17 Debug achim.gratz@cygwin
Cygwin libprocps-devel 3.3.17 System achim.gratz@cygwin
Cygwin libprocps-ng4 3.3.17 System achim.gratz@cygwin
Cygwin libprocps-ng5 3.3.17 System achim.gratz@cygwin
Cygwin libprocps-ng6 3.3.17 System achim.gratz@cygwin
Cygwin libprocps7 3.3.17 System achim.gratz@cygwin
Cygwin libprocps8 3.3.17 System achim.gratz@cygwin
Cygwin procps-ng 3.3.17 System achim.gratz@cygwin
Debian 9
stretch/main
procps 3.3.12 Potentially vulnerable admin csmall@debian.org
Debian 10
buster/main
procps 3.3.15 Potentially vulnerable admin csmall@debian.org
Debian 11
bullseye/main
procps 3.3.17 admin csmall@debian.org
Debian 12
bookworm/main
procps 3.3.17 admin csmall@debian.org
Debian Unstable
sid/main
procps 3.3.17 admin csmall@debian.org
Debian Experimental
experimental/main
procps 4.0.0 admin csmall@debian.org
Deepin
main
procps 3.3.15 Potentially vulnerable - csmall@debian.org
Devuan 2.0
ascii/main
procps 3.3.12 Potentially vulnerable misc parazyd@dyne.org
Devuan 3.0
beowulf/main
procps 3.3.15 Potentially vulnerable misc devuan-dev@lists.dyne.org, daniel@centurion.net.nz, mark@hindley.org.uk
Devuan 4.0
chimaera/main
procps 3.3.17 misc devuan-dev@lists.dyne.org, daniel@centurion.net.nz, mark@hindley.org.uk
Devuan Unstable
unstable/main
procps 3.3.17 admin devuan-dev@lists.dyne.org, daniel@centurion.net.nz, mark@hindley.org.uk
distri procps-ng 3.3.15 Potentially vulnerable - -
Entware
aarch64-k3.10
procps-ng-kill 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-pgrep 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-pkill 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-pmap 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-ps 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-skill 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-slabtop 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-snice 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-sysctl 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-tload 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-top 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-uptime 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-vmstat 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-w 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-watch 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-free 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-kill 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-pgrep 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-pkill 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-pmap 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-ps 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-pwdx 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-skill 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-slabtop 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-snice 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-sysctl 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-tload 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-top 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-uptime 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-vmstat 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-w 3.3.16 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-watch 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-free 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-kill 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-pgrep 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-pkill 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-pmap 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-ps 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-pwdx 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-skill 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-slabtop 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-snice 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-sysctl 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-tload 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-top 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-uptime 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-vmstat 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-w 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-watch 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-free 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-kill 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-pgrep 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-pkill 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-pmap 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-ps 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-pwdx 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-skill 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-slabtop 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-snice 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-sysctl 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-tload 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-top 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-uptime 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-vmstat 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-w 3.3.16 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-watch 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-free 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-kill 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-pgrep 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-pkill 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-pmap 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-ps 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-pwdx 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-skill 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-slabtop 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-snice 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-sysctl 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-tload 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-top 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-uptime 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-vmstat 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-w 3.3.16 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-watch 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-free 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-kill 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-pgrep 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-pkill 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-pmap 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-ps 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-pwdx 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-skill 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-slabtop 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-snice 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-sysctl 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-tload 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-top 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-uptime 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-vmstat 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-w 3.3.16 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-watch 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-free 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-kill 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-pgrep 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-pkill 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-pmap 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-ps 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-pwdx 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-skill 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-slabtop 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-snice 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-sysctl 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-tload 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-top 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-uptime 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-vmstat 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-w 3.3.16 utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-watch 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-pwdx 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng 3.3.16 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-free 3.3.16 utils fallback-mnt-entware@repology
EuroLinux 8
baseos
procps-ng 3.3.15 Potentially vulnerable Applications/System -
EuroLinux 8
baseos
procps-ng 3.3.15 Potentially vulnerable Applications/System -
EuroLinux 8
baseos
procps-ng 3.3.15 Potentially vulnerable Applications/System -
EuroLinux 8
baseos
procps-ng 3.3.15 Potentially vulnerable Applications/System -
Exherbo
arbor
sys-process/procps 3.3.17 sys-process fallback-mnt-exherbo@repology
Fedora 26
release
procps-ng 3.3.10 Potentially vulnerable Applications/System -
Fedora 27
updates
procps-ng 3.3.10 Potentially vulnerable Applications/System -
Fedora 27
release
procps-ng 3.3.10 Potentially vulnerable Applications/System -
Fedora 28
release
procps-ng 3.3.12 Potentially vulnerable Applications/System -
Fedora 28
updates
procps-ng 3.3.12 Potentially vulnerable Applications/System -
Fedora 29
release
procps-ng 3.3.15 Potentially vulnerable Applications/System -
Fedora 30
release
procps-ng 3.3.15 Potentially vulnerable Unspecified -
Fedora 31
release
procps-ng 3.3.15 Potentially vulnerable Unspecified -
Fedora 32
updates
procps-ng 3.3.16 Unspecified -
Fedora 32
release
procps-ng 3.3.15 Potentially vulnerable Unspecified -
Fedora 33
updates
procps-ng 3.3.16 Unspecified -
Fedora 33
release
procps-ng 3.3.16 Unspecified -
Fedora 34
updates
procps-ng 3.3.17 Unspecified -
Fedora 34
release
procps-ng 3.3.17 Unspecified -
Fedora 35
release
procps-ng 3.3.17 Unspecified -
Fedora 36
development
procps-ng 3.3.17 Unspecified -
Fedora Rawhide
development
procps-ng 3.3.17 Unspecified -
Funtoo 1.4
core-kit
sys-process/procps 3.3.17 sys-process fallback-mnt-funtoo@repology
Gentoo sys-process/procps 3.3.17 sys-process base-system@gentoo.org
GNU Guix procps 3.3.16 - -
GoboLinux Procps-NG 3.3.16 - -
Homebrew procps 4.0.0 - -
Kali Linux Rolling
main
procps 3.3.17 admin csmall@debian.org
KaOS
core
procps-ng 4.0.0 - demm@kaosx.us
LiGurOS stable sys-process/procps 3.3.17 sys-process base-system@gentoo.org
LiGurOS develop sys-process/procps 3.3.17 sys-process base-system@gentoo.org
Mageia 7
core/release
procps-ng 3.3.15 Potentially vulnerable Monitoring -
Mageia 8
core/updates
procps-ng 3.3.17 Monitoring -
Mageia 8
core/release
procps-ng 3.3.16 Monitoring -
Mageia Cauldron
core/release
procps-ng 3.3.17 Monitoring -
Manjaro Stable
core
procps-ng 3.3.17 - -
Manjaro Stable
multilib
lib32-procps-ng 3.3.17 - -
Manjaro Testing
core
procps-ng 3.3.17 - -
Manjaro Testing
multilib
lib32-procps-ng 3.3.17 - -
Manjaro Unstable
multilib
lib32-procps-ng 3.3.17 - -
Manjaro Unstable
core
procps-ng 3.3.17 - -
MSYS2 msys2
x86_64
procps-ng 3.3.17 sys-utils -
MSYS2 msys2
i686
procps-ng 3.3.16 sys-utils -
nixpkgs stable 21.05 procps 3.3.16 - ericwolf42@mail.com
nixpkgs stable 21.11 procps 3.3.16 - ericwolf42@mail.com
nixpkgs unstable procps 3.3.16 - ericwolf42@mail.com
openEuler 20.03
source
procps-ng 3.3.16 Unspecified -
openmamba
devel
procps-ng 3.3.17 System/Tools silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
procps-ng 3.3.15 Potentially vulnerable Monitoring bero@lindev.ch
OpenMandriva 4.0
main/release
procps-ng 3.3.15 Potentially vulnerable Monitoring bero@lindev.ch
OpenMandriva 4.1
main/release
procps-ng 3.3.16 Monitoring nobodydead@gmail.com
OpenMandriva 4.2
main/release
procps-ng 3.3.16 Monitoring bero@lindev.ch
OpenMandriva Rolling
main/release
procps-ng 3.3.17 Monitoring bero+massbuild@lindev.ch
OpenMandriva Cooker
main/release
procps-ng 3.3.17 Monitoring bero+massbuild@lindev.ch
openSUSE Leap 42.3
updates/oss
procps 3.3.9 Potentially vulnerable System/Monitoring -
openSUSE Leap 42.3
updates/oss
procps 3.3.9 Potentially vulnerable System/Monitoring -
openSUSE Leap 42.3
updates/oss
procps 3.3.9 Potentially vulnerable System/Monitoring -
openSUSE Leap 42.3
updates/oss
procps 3.3.9 Potentially vulnerable System/Monitoring -
openSUSE Leap 42.3
main/oss
procps 3.3.9 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.0
updates/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.0
main/oss
procps 3.3.12 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.1
updates/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.1
updates/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.1
updates/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.1
main/oss
procps 3.3.12 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.2
updates/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.2
updates/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.2
updates/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.2
main/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.3
main/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.4
main/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Tumbleweed
src-oss
procps 3.3.17 System/Monitoring -
OpenWrt 17.01 x86_64
packages
procps-ng-slabtop 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-snice 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-tload 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-top 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-uptime 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-vmstat 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-w 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-watch 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-free 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-kill 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-pgrep 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-pkill 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-pmap 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-ps 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-pwdx 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-skill 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-free 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-kill 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-pgrep 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-pkill 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-pmap 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-ps 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-pwdx 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-skill 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-slabtop 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-snice 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-tload 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-top 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-uptime 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-vmstat 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-w 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-watch 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-free 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-kill 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-pgrep 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-pkill 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-pmap 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-ps 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-pwdx 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-skill 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-slabtop 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-snice 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-tload 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-top 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-uptime 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-vmstat 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-w 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-watch 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 21.02 x86_64
packages
procps-ng-free 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-kill 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-pgrep 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-pkill 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-pmap 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-ps 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-pwdx 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-skill 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-slabtop 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-snice 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-sysctl 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-tload 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-top 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-uptime 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-vmstat 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-w 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-watch 3.3.16 utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng 3.3.16 utils fallback-mnt-openwrt@repology
Parabola
core
procps-ng 3.3.17 - -
Pardus 17
updates/main
procps 3.3.12 Potentially vulnerable admin csmall@debian.org
Pardus 17
main
procps 3.3.12 Potentially vulnerable admin csmall@debian.org
Pardus 19
main
procps 3.3.15 Potentially vulnerable admin csmall@debian.org
Pardus 21
main
procps 3.3.17 admin csmall@debian.org
Parrot
parrot-updates/main
procps 3.3.17 admin csmall@debian.org
Parrot
parrot/main
procps 3.3.17 admin csmall@debian.org
Pisi Linux
core
procps 3.3.16 app:console admins@pisilinux.org
PureOS Amber procps 3.3.15 Potentially vulnerable misc csmall@debian.org
PureOS landing procps 3.3.17 misc csmall@debian.org
Raspbian Oldstable
main
procps 3.3.15 Potentially vulnerable admin csmall@debian.org
Raspbian Stable
main
procps 3.3.17 admin csmall@debian.org
Raspbian Testing
main
procps 3.3.17 admin csmall@debian.org
Rocky Linux 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System infrastructure@rockylinux.org
Rosa 2014.1
main/updates
procps-ng 3.3.10 Potentially vulnerable - -
Rosa 2016.1
main/release
procps-ng 3.3.12 Potentially vulnerable - -
Rosa 2019.1
main/release
procps-ng 3.3.17 Monitoring alexander@mezon.ru
Rosa Server 7.3
base/release
procps-ng 3.3.10 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
procps-ng 3.3.10 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
procps-ng 3.3.10 Potentially vulnerable Applications/System alex2048@mail.ru
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.9 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.8 Potentially vulnerable Applications/System -
Slackware 14.2
patches
procps-ng 3.3.15 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
procps-ng 3.3.11 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
procps-ng 3.3.17 - volkerdi@slackware.com
Slackware current
slackware
procps-ng 3.3.17 - volkerdi@slackware.com
Slackware64 14.2
patches
procps-ng 3.3.15 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
procps-ng 3.3.11 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
procps-ng 3.3.17 - volkerdi@slackware.com
Slackware64 current
slackware64
procps-ng 3.3.17 - volkerdi@slackware.com
Slackwarearm 14.2
patches
procps-ng 3.3.15 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
procps-ng 3.3.11 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
procps-ng 3.3.17 - volkerdi@slackware.com
SliTaz Next procps-ng 3.3.12 Potentially vulnerable base-system al.bobylev@gmail.com
SliTaz Next procps-ng-dev 3.3.12 Potentially vulnerable development al.bobylev@gmail.com
Solus procps-ng 3.3.16 system.base josephriches@gmail.com
Solus procps-ng-dbginfo 3.3.16 debug josephriches@gmail.com
Solus procps-ng-devel 3.3.16 programming.devel josephriches@gmail.com
Spack procps master - fallback-mnt-spack@repology
Spack procps-ng 3.3.16 - fallback-mnt-spack@repology
Spack procps 3.3.15 Potentially vulnerable - fallback-mnt-spack@repology
T2 SDE procps 3.3.17 base/tool rene@t2-project.org
Termux procps 3.3.17 - termux@github
Trisquel 9.0
etiona-updates/main
procps 3.3.12 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 9.0
etiona/main
procps 3.3.12 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia-updates/main
procps 3.3.16 admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia/main
procps 3.3.16 admin ubuntu-devel-discuss@lists.ubuntu.com
UBI 8
baseos
procps-ng 3.3.15 Potentially vulnerable Applications/System -
Ubuntu 18.04
bionic/main
procps 3.3.12 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic-updates/main
procps 3.3.12 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/main
procps 3.3.16 admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal-updates/main
procps 3.3.16 admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 21.04
hirsute/main
procps 3.3.16 admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 21.04
hirsute-updates/main
procps 3.3.16 admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 21.10
impish/main
procps 3.3.17 admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 22.04
jammy/main
procps 3.3.17 admin ubuntu-devel-discuss@lists.ubuntu.com
Void Linux x86_64
x86_64
procps-ng 3.3.17 - gottox@voidlinux.org
Void Linux x86_64
x86_64
procps-ng-devel 3.3.17 - gottox@voidlinux.org
yiffOS Knot procps-ng 3.3.17 - evie@uwueviee.live