Versions Packages Information History CVEs Related Badges Report

Versions for procps-ng

531 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
system
libproc 3.3.17 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
system
procps 3.3.17 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
system
procps-dbg 3.3.17 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
system
procps-dev 3.3.17 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
system
procps-doc 3.3.17 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
system
procps-lang 3.3.17 Potentially vulnerable - awilfox@adelielinux.org
AlmaLinux 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System packager@almalinux.org
AlmaLinux 9
BaseOS
procps-ng 3.3.17 Potentially vulnerable Unspecified packager@almalinux.org
Alpine Linux 3.8
main
libproc 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
procps-dev 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
procps 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
procps-doc 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
procps-lang 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
procps-lang 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
procps 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
procps-dev 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
procps-doc 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
libproc 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
procps-doc 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
procps-lang 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
libproc 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
procps-dev 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
procps 3.3.15 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
procps-lang 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
procps-doc 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
procps-dev 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
libproc 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
procps 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
libproc 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
procps-dev 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
procps-doc 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
procps 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
procps-lang 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
procps-lang 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
libproc 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
procps-dev 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
procps-doc 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
procps 3.3.16 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
libproc 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
procps-doc 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
procps 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
procps-lang 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
procps-dev 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
procps-doc 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
libproc 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
procps 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
procps-dev 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
procps-lang 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
procps-doc 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
procps-dev 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
procps 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
libproc 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
procps-lang 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
libproc 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
procps-dev 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
procps 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
procps-doc 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
procps-lang 3.3.17 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.18
main
libproc2 4.0.4 - ncopa@alpinelinux.org
Alpine Linux 3.18
main
procps-ng 4.0.4 - ncopa@alpinelinux.org
Alpine Linux 3.18
main
procps-ng-dev 4.0.4 - ncopa@alpinelinux.org
Alpine Linux 3.18
main
procps-ng-doc 4.0.4 - ncopa@alpinelinux.org
Alpine Linux 3.18
main
procps-ng-lang 4.0.4 - ncopa@alpinelinux.org
Alpine Linux Edge
main
procps-ng 4.0.4 - ncopa@alpinelinux.org
Alpine Linux Edge
main
procps-ng-dev 4.0.4 - ncopa@alpinelinux.org
Alpine Linux Edge
main
procps-ng-doc 4.0.4 - ncopa@alpinelinux.org
Alpine Linux Edge
main
procps-ng-lang 4.0.4 - ncopa@alpinelinux.org
Alpine Linux Edge
main
libproc2 4.0.4 - ncopa@alpinelinux.org
ALT Linux p9 procps 3.3.16 Potentially vulnerable Monitoring sem@altlinux.org
ALT Linux p10 procps 3.3.17 Potentially vulnerable Monitoring mike@altlinux.org
ALT Sisyphus procps 4.0.4 Monitoring mike@altlinux.org
Amazon Linux 2 procps-ng 3.3.10 Potentially vulnerable Applications/System -
Amazon Linux 2 procps-ng 3.3.10 Potentially vulnerable Applications/System -
Amazon Linux 2 procps-ng 3.3.10 Potentially vulnerable Applications/System -
Amazon Linux 2 procps-ng 3.3.10 Potentially vulnerable Applications/System -
antiX-19
dev
procps 3.3.17 Potentially vulnerable dev csmall@debian.org
antiX-19
nosystemd
procps 3.3.17 Potentially vulnerable nosystemd csmall@debian.org
antiX-21
dev
procps 3.3.17 Potentially vulnerable dev csmall@debian.org
antiX-21
nosystemd
procps 3.3.17 Potentially vulnerable nosystemd csmall@debian.org
Apertis v2021
v2021/target
procps 3.3.15 Potentially vulnerable - csmall@debian.org
Apertis v2022
v2022/target
procps 3.3.17 Potentially vulnerable - csmall@debian.org
Apertis v2023
v2023/target
procps 3.3.17 Potentially vulnerable - csmall@debian.org
Apertis v2024 Development
v2024pre/target
procps 4.0.2 Potentially vulnerable - csmall@debian.org
Arch
multilib
lib32-procps-ng 4.0.4 - -
Arch
core
procps-ng 4.0.4 - -
Arch Linux 32 i486
core
procps-ng 3.3.17 Potentially vulnerable - -
Arch Linux 32 i686
core
procps-ng 3.3.17 Potentially vulnerable - -
Arch Linux 32 pentium4
core
procps-ng 3.3.17 Potentially vulnerable - -
Arch Linux ARM aarch64
core
procps-ng 4.0.4 - -
ArchPOWER powerpc procps-ng 4.0.4 - -
ArchPOWER powerpc64le procps-ng 4.0.4 - -
ArchPOWER riscv64 procps-ng 4.0.4 - -
AUR procps-ng-git 4.0.1.r3.g474e22eb - unicorndarkness@aur
Artix
system
procps-ng 4.0.4 - -
Ataraxia GNU/Linux procps-ng 3.3.17 Potentially vulnerable base -
Buildroot 2023.02.x procps-ng 3.3.17 Potentially vulnerable - -
Buildroot 2023.05.x procps-ng 3.3.17 Potentially vulnerable - -
Buildroot master procps-ng 3.3.17 Potentially vulnerable - -
Carbs Linux
extra
procps-ng 4.0.4 - cem@carbslinux.org
CentOS 7
os
procps-ng 3.3.10 Potentially vulnerable Applications/System -
CentOS 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System builder@centos.org
CentOS Stream 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 9
BaseOS
procps-ng 3.3.17 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
procps-ng 3.3.17 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
procps-ng 3.3.17 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
procps-ng 3.3.17 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
procps-ng 3.3.17 Potentially vulnerable Unspecified builder@centos.org
CRUX 3.4
core
procps 3.3.15 Potentially vulnerable - core-ports@crux.nu
CRUX 3.5
core
procps 3.3.16 Potentially vulnerable - core-ports@crux.nu
CRUX 3.6
core
procps 3.3.17 Potentially vulnerable - core-ports@crux.nu
CRUX 3.7
core
procps 4.0.4 - core-ports@crux.nu
Cygwin libproc2-devel 4.0.4 System achim.gratz@cygwin
Cygwin libproc2_0 4.0.4 System achim.gratz@cygwin
Cygwin libprocps-devel 4.0.4 System achim.gratz@cygwin
Cygwin libprocps-ng4 4.0.4 System achim.gratz@cygwin
Cygwin libprocps-ng6 4.0.4 System achim.gratz@cygwin
Cygwin libprocps7 4.0.4 System achim.gratz@cygwin
Cygwin libprocps8 4.0.4 System achim.gratz@cygwin
Cygwin procps-ng 4.0.4 System achim.gratz@cygwin
Cygwin procps-ng-debuginfo 4.0.4 Debug achim.gratz@cygwin
Debian 10
buster/main
procps 3.3.15 Potentially vulnerable admin csmall@debian.org
Debian 11
bullseye/main
procps 3.3.17 Potentially vulnerable admin csmall@debian.org
Debian 12
bookworm/main
procps 4.0.2 Potentially vulnerable admin csmall@debian.org
Debian 13
trixie/main
procps 4.0.4 admin csmall@debian.org
Debian Unstable
sid/main
procps 4.0.4 admin csmall@debian.org
Deepin
main
procps 3.3.15 Potentially vulnerable - csmall@debian.org
Devuan 3.0
beowulf/main
procps 3.3.15 Potentially vulnerable misc devuan-dev@lists.dyne.org, daniel@centurion.net.nz, mark@hindley.org.uk
Devuan 4.0
chimaera/main
procps 3.3.17 Potentially vulnerable misc devuan-dev@lists.dyne.org, daniel@centurion.net.nz, mark@hindley.org.uk
Devuan Unstable
unstable/main
procps 4.0.4 admin devuan-dev@lists.dyne.org, daniel@centurion.net.nz, mark@hindley.org.uk
distri procps-ng 3.3.15 Potentially vulnerable - -
Entware
mipselsf-k3.4
procps-ng-pwdx 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-skill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-pgrep 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-pkill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-pmap 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-slabtop 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-snice 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-pkill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-pmap 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-ps 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-free 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-kill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-pgrep 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-pwdx 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-skill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-slabtop 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-snice 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-sysctl 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-tload 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-top 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-uptime 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-vmstat 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-w 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
procps-ng-watch 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-free 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-kill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-pgrep 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-pkill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-pmap 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-ps 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-sysctl 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-tload 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-top 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-uptime 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-vmstat 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-w 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
procps-ng-watch 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-free 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-kill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-pgrep 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-pkill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-pmap 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-ps 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-pwdx 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-skill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-slabtop 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-snice 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-sysctl 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-tload 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-top 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-uptime 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-vmstat 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-w 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
procps-ng-watch 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-free 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-kill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-ps 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-pwdx 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-skill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-slabtop 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-snice 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-sysctl 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-tload 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-top 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-uptime 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-vmstat 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-w 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
x64-k3.2
procps-ng-watch 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-free 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-kill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-pgrep 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-pkill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-pmap 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-ps 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-pwdx 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-skill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-slabtop 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-snice 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-sysctl 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-tload 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-top 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-uptime 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-vmstat 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-w 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
procps-ng-watch 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-free 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-kill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-pgrep 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-pkill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-pmap 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-ps 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-pwdx 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-skill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-slabtop 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-snice 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-sysctl 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-tload 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-top 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-uptime 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-vmstat 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-w 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
procps-ng-watch 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-free 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-kill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-pgrep 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-pkill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-pmap 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-ps 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-pwdx 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-skill 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-slabtop 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-snice 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-sysctl 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-tload 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-top 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-uptime 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-vmstat 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-w 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
procps-ng-watch 3.3.16 Potentially vulnerable utils fallback-mnt-entware@repology
EuroLinux 8
baseos
procps-ng 3.3.15 Potentially vulnerable Applications/System -
EuroLinux 8
baseos
procps-ng 3.3.15 Potentially vulnerable Applications/System -
EuroLinux 8
baseos
procps-ng 3.3.15 Potentially vulnerable Applications/System -
EuroLinux 8
baseos
procps-ng 3.3.15 Potentially vulnerable Applications/System -
EuroLinux 9
appstream
procps-ng 3.3.17 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
procps-ng 3.3.17 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
procps-ng 3.3.17 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
procps-ng 3.3.17 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
procps-ng 3.3.17 Potentially vulnerable Unspecified -
Exherbo
arbor
sys-process/procps 4.0.4 sys-process fallback-mnt-exherbo@repology
Fedora 26
release
procps-ng 3.3.10 Potentially vulnerable Applications/System -
Fedora 27
updates
procps-ng 3.3.10 Potentially vulnerable Applications/System -
Fedora 27
release
procps-ng 3.3.10 Potentially vulnerable Applications/System -
Fedora 28
updates
procps-ng 3.3.12 Potentially vulnerable Applications/System -
Fedora 28
release
procps-ng 3.3.12 Potentially vulnerable Applications/System -
Fedora 29
release
procps-ng 3.3.15 Potentially vulnerable Applications/System -
Fedora 30
release
procps-ng 3.3.15 Potentially vulnerable Unspecified -
Fedora 31
release
procps-ng 3.3.15 Potentially vulnerable Unspecified -
Fedora 32
updates
procps-ng 3.3.16 Potentially vulnerable Unspecified -
Fedora 32
release
procps-ng 3.3.15 Potentially vulnerable Unspecified -
Fedora 33
updates
procps-ng 3.3.16 Potentially vulnerable Unspecified -
Fedora 33
release
procps-ng 3.3.16 Potentially vulnerable Unspecified -
Fedora 34
release
procps-ng 3.3.17 Potentially vulnerable Unspecified -
Fedora 34
updates
procps-ng 3.3.17 Potentially vulnerable Unspecified -
Fedora 35
release
procps-ng 3.3.17 Potentially vulnerable Unspecified -
Fedora 36
updates
procps-ng 3.3.17 Potentially vulnerable Unspecified -
Fedora 36
release
procps-ng 3.3.17 Potentially vulnerable Unspecified -
Fedora 37
release
procps-ng 3.3.17 Potentially vulnerable Unspecified -
Fedora 37
updates
procps-ng 3.3.17 Potentially vulnerable Unspecified -
Fedora 38
release
procps-ng 3.3.17 Potentially vulnerable Unspecified -
Fedora 38
updates
procps-ng 3.3.17 Potentially vulnerable Unspecified -
Fedora 39
development
procps-ng 4.0.3 Potentially vulnerable Unspecified -
Fedora 39
updates
procps-ng 4.0.3 Potentially vulnerable Unspecified -
Fedora Rawhide
development
procps-ng 4.0.4 Unspecified -
Gentoo sys-process/procps 4.0.4 sys-process base-system@gentoo.org
Gentoo sys-process/procps 3.3.17 Potentially vulnerable sys-process base-system@gentoo.org
glaucus procps-ng 4.0.4 - firasuke@glaucuslinux.org
GNU Guix procps 4.0.3 Potentially vulnerable - -
GoboLinux Procps-NG 3.3.16 Potentially vulnerable - -
Homebrew procps HEAD - -
Homebrew procps 4.0.4 - -
Homebrew procps@3 3.3.17 Potentially vulnerable - -
Kali Linux Rolling
main
procps 4.0.4 admin csmall@debian.org
KaOS
core
procps-ng 4.0.4 - demm@kaosx.us
LiGurOS stable sys-process/procps 4.0.4 sys-process base-system@gentoo.org
LiGurOS stable sys-process/procps 3.3.17 Potentially vulnerable sys-process base-system@gentoo.org
LiGurOS develop sys-process/procps 4.0.4 sys-process base-system@gentoo.org
LiGurOS develop sys-process/procps 3.3.17 Potentially vulnerable sys-process base-system@gentoo.org
Mageia 8
core/updates
procps-ng 3.3.17 Potentially vulnerable Monitoring -
Mageia 8
core/release
procps-ng 3.3.16 Potentially vulnerable Monitoring -
Mageia cauldron
core/release
procps-ng 4.0.4 Monitoring -
Manjaro Stable
core
procps-ng 4.0.4 - -
Manjaro Stable
multilib
lib32-procps-ng 4.0.4 - -
Manjaro Testing
multilib
lib32-procps-ng 4.0.4 - -
Manjaro Testing
core
procps-ng 4.0.4 - -
Manjaro Unstable
core
procps-ng 4.0.4 - -
Manjaro Unstable
multilib
lib32-procps-ng 4.0.4 - -
MSYS2 msys2
x86_64
procps-ng 3.3.17 Potentially vulnerable sys-utils -
MX Linux MX-21 Testing procps 4.0.2 Potentially vulnerable admin stevep@mxlinux.org
nixpkgs stable 21.11 procps 3.3.16 Potentially vulnerable - ericwolf42@mail.com
nixpkgs stable 22.05 procps 3.3.16 Potentially vulnerable - ericwolf42@mail.com
nixpkgs stable 22.11 procps 3.3.16 Potentially vulnerable - ericwolf42@mail.com
nixpkgs stable 23.05 procps 3.3.17 Potentially vulnerable - ericwolf42@mail.com
nixpkgs stable 23.11 procps 3.3.17 Potentially vulnerable - ericwolf42@mail.com
nixpkgs unstable procps 3.3.17 Potentially vulnerable - ericwolf42@mail.com
openEuler 20.03
source
procps-ng 3.3.16 Potentially vulnerable Unspecified -
openEuler 22.03
source
procps-ng 3.3.17 Potentially vulnerable Unspecified -
openmamba
devel
procps-ng 4.0.4 System/Tools silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
procps-ng 3.3.15 Potentially vulnerable Monitoring bero@lindev.ch
OpenMandriva 4.0
main/release
procps-ng 3.3.15 Potentially vulnerable Monitoring bero@lindev.ch
OpenMandriva 4.1
main/release
procps-ng 3.3.16 Potentially vulnerable Monitoring nobodydead@gmail.com
OpenMandriva 4.2
main/release
procps-ng 3.3.16 Potentially vulnerable Monitoring bero@lindev.ch
OpenMandriva 4.3
main/release
procps-ng 3.3.17 Potentially vulnerable Monitoring bero+massbuild@lindev.ch
OpenMandriva Rolling
main/release
procps-ng 4.0.4 Monitoring bero@lindev.ch
OpenMandriva Cooker
main/release
procps-ng 4.0.4 Monitoring bero@lindev.ch
openSUSE Leap 42.3
updates/oss
procps 3.3.9 Potentially vulnerable System/Monitoring -
openSUSE Leap 42.3
updates/oss
procps 3.3.9 Potentially vulnerable System/Monitoring -
openSUSE Leap 42.3
updates/oss
procps 3.3.9 Potentially vulnerable System/Monitoring -
openSUSE Leap 42.3
updates/oss
procps 3.3.9 Potentially vulnerable System/Monitoring -
openSUSE Leap 42.3
main/oss
procps 3.3.9 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.0
updates/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.0
updates/sle
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.0
updates/sle
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.0
main/oss
procps 3.3.12 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.1
updates/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.1
updates/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.1
updates/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.1
updates/sle
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.1
updates/sle
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.1
main/oss
procps 3.3.12 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.2
updates/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.2
updates/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.2
updates/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.2
updates/sle
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.2
updates/sle
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.2
main/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.3
updates/sle
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.3
updates/sle
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.3
main/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.4
main/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.4
updates/sle
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.4
updates/sle
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.5
main/oss
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.5
updates/sle
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.5
updates/sle
procps 3.3.15 Potentially vulnerable System/Monitoring -
openSUSE Tumbleweed
src-oss
procps 3.3.17 Potentially vulnerable System/Monitoring -
OpenWrt 17.01 x86_64
packages
procps-ng-ps 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-free 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-kill 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-pgrep 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-pkill 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-pmap 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-pwdx 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-skill 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-slabtop 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-snice 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-tload 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-top 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-uptime 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-vmstat 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-w 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng-watch 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 17.01 x86_64
packages
procps-ng 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-free 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-kill 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-pgrep 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-pkill 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-pmap 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-ps 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-pwdx 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-skill 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-slabtop 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-snice 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-tload 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-top 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-uptime 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-vmstat 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-w 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng-watch 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
procps-ng 3.3.11 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-free 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-kill 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-pgrep 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-pkill 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-pmap 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-ps 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-pwdx 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-skill 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-slabtop 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-snice 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-tload 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-top 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-uptime 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-vmstat 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-w 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng-watch 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 19.07 x86_64
packages
procps-ng 3.3.15 Potentially vulnerable utils mail.gery@gmail.com
OpenWrt 21.02 x86_64
packages
procps-ng-free 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-kill 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-pgrep 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-pkill 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-pmap 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-ps 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-pwdx 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-skill 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-slabtop 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-snice 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-sysctl 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-tload 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-top 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-uptime 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-vmstat 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-w 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng-watch 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
procps-ng 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-free 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-kill 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-pgrep 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-pkill 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-pmap 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-ps 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-pwdx 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-skill 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-slabtop 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-snice 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-sysctl 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-tload 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-top 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-uptime 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-vmstat 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-w 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng-watch 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 22.03 x86_64
packages
procps-ng 3.3.16 Potentially vulnerable utils fallback-mnt-openwrt@repology
Parabola
core
procps-ng 4.0.4 - -
Pardus 21
main
procps 3.3.17 Potentially vulnerable admin csmall@debian.org
Parrot
parrot/main
procps 3.3.17 Potentially vulnerable admin csmall@debian.org
Parrot
parrot-updates/main
procps 3.3.17 Potentially vulnerable admin csmall@debian.org
Pisi Linux
core
procps 3.3.17 Potentially vulnerable app:console admins@pisilinux.org
PureOS Amber procps 3.3.15 Potentially vulnerable libdevel csmall@debian.org
PureOS landing procps 4.0.2 Potentially vulnerable libs csmall@debian.org
Raspbian Oldstable
main
procps 3.3.17 Potentially vulnerable admin csmall@debian.org
Raspbian Stable
main
procps 4.0.2 Potentially vulnerable admin csmall@debian.org
Raspbian Testing
main
procps 4.0.4 admin csmall@debian.org
Rocky Linux 8
BaseOS
procps-ng 3.3.15 Potentially vulnerable Applications/System infrastructure@rockylinux.org
Rocky Linux 9
BaseOS
procps-ng 3.3.17 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
CRB
procps-ng 3.3.17 Potentially vulnerable Unspecified releng@rockylinux.org
Rosa 2014.1
main/updates
procps-ng 3.3.10 Potentially vulnerable - -
Rosa 2016.1
main/release
procps-ng 3.3.12 Potentially vulnerable - -
Rosa 2021.1
main/release
procps-ng 3.3.17 Potentially vulnerable Monitoring alexander@mezon.ru
Rosa Server 7.3
base/release
procps-ng 3.3.10 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
procps-ng 3.3.10 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
procps-ng 3.3.10 Potentially vulnerable Applications/System alex2048@mail.ru
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.10 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.9 Potentially vulnerable Applications/System -
Scientific Linux 7.x procps-ng 3.3.8 Potentially vulnerable Applications/System -
Slackware 14.2
patches
procps-ng 3.3.15 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
procps-ng 3.3.11 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
procps-ng 3.3.17 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
procps-ng 3.3.17 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
patches
procps-ng 3.3.15 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
procps-ng 3.3.11 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
procps-ng 3.3.17 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
procps-ng 3.3.17 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
patches
procps-ng 3.3.15 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
procps-ng 3.3.11 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
procps-ng 3.3.17 Potentially vulnerable - volkerdi@slackware.com
SliTaz Next procps-ng 3.3.12 Potentially vulnerable base-system al.bobylev@gmail.com
SliTaz Next procps-ng-dev 3.3.12 Potentially vulnerable development al.bobylev@gmail.com
SliTaz Next procps-ng 3.3.12 Potentially vulnerable base-system al.bobylev@gmail.com
SliTaz Next procps-ng-dev 3.3.12 Potentially vulnerable development al.bobylev@gmail.com
Solus procps-ng 3.3.17 Potentially vulnerable system.base josephriches@gmail.com
Solus procps-ng-dbginfo 3.3.17 Potentially vulnerable debug josephriches@gmail.com
Solus procps-ng-devel 3.3.17 Potentially vulnerable programming.devel josephriches@gmail.com
Spack procps master - fallback-mnt-spack@repology
Spack procps 4.0.4 - fallback-mnt-spack@repology
Spack procps-ng 3.3.16 Potentially vulnerable - fallback-mnt-spack@repology
T2 SDE procps 4.0.3 Potentially vulnerable base/tool rene@t2-project.org
Termux procps 3.3.17 Potentially vulnerable - termux@github
Trisquel 10.0
nabia-updates/main
procps 3.3.16 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia-updates/main
procps 3.3.16 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia-security/main
procps 3.3.16 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia/main
procps 3.3.16 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 11.0
aramo-updates/main
procps 3.3.17 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 11.0
aramo-security/main
procps 3.3.17 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 11.0
aramo/main
procps 3.3.17 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
UBI 8
baseos
procps-ng 3.3.15 Potentially vulnerable Applications/System -
Ubuntu 18.04
bionic/main
procps 3.3.12 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic-updates/main
procps 3.3.12 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/main
procps 3.3.16 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal-updates/main
procps 3.3.16 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 22.04
jammy/main
procps 3.3.17 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 22.04
jammy-updates/main
procps 3.3.17 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 23.04
lunar-updates/main
procps 4.0.3 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 23.04
lunar/main
procps 4.0.3 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 23.10
mantic/main
procps 4.0.3 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 23.10
mantic-updates/main
procps 4.0.3 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Void Linux x86_64
x86_64
procps-ng 4.0.4 - gottox@voidlinux.org
Void Linux x86_64
x86_64
procps-ng-devel 4.0.4 - gottox@voidlinux.org
yiffOS Knot procps-ng 3.3.17 Potentially vulnerable - evie@eviee.gay