Versions Packages Information History CVEs Related Badges Report

Versions for qemu

1071 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
qemu-system-moxie 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-riscv64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-riscv64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-alpha 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-dbg 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-tilegx 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-mips64el 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-sparc 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-mips64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-lm32 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-sh4eb 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-user 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-x86_64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-mipsel 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-guest-agent 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-nios2 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-aarch64_be 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-or1k 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-ppc64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-tricore 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-mips64el 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-sh4 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-lang 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-xtensa 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-riscv32 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-gtk 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-i386 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-ppc 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-sparc 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-microblaze 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-xtensaeb 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-alpha 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-xtensaeb 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-riscv32 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-sparc32plus 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-cris 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-ppc 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-sparc64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-mips 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-mipsn32 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-microblazeel 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-sh4eb 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-mipsel 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-ppc64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-i386 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-img 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-or1k 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-mipsn32el 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-m68k 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-x86_64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-arm 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-nios2 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-doc 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-unicore32 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-xtensa 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-arm 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-hppa 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-cris 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-armeb 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-sparc64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-m68k 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-ppc64le 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-mips64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-aarch64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-hppa 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-mips 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-s390x 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-microblaze 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-s390x 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-ppc64abi32 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-sh4 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-aarch64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-microblazeel 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-ppcemb 3.0.0 Potentially vulnerable - awilfox@adelielinux.org
AIX Open Source Packages qemu 0.9.1 Potentially vulnerable - -
Alpine Linux 3.8
main
qemu-arm 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-block-curl 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-modules 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-xtensaeb 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-alpha 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-unicore32 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-aarch64_be 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
ivshmem-tools 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-m68k 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-armeb 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-mips64el 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-nios2 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-aarch64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-mips64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-hppa 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-audio-sdl 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-mips64el 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-sparc32plus 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-riscv32 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-img 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-riscv32 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-or1k 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-sh4 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-alpha 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-audio-oss 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-s390x 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-ppc 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-mips 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-tilegx 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-microblaze 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-block-dmg-bz2 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-ppc64le 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-tricore 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-or1k 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-cris 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-x86_64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-hppa 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-aarch64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-moxie 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-sparc 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-microblaze 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-sparc 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-ppc64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-sh4eb 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-doc 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-ppcemb 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-mips 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-block-ssh 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-sparc64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-lang 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-xtensa 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-mips64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-mipsn32 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-riscv64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-microblazeel 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-ui-curses 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-ui-sdl 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-ppc64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-sh4eb 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-x86_64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-mipsel 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-mipsel 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-sparc64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-mipsn32el 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-s390x 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-guest-agent 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-audio-alsa 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-ppc 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-block-nfs 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-m68k 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-xtensaeb 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-ui-gtk 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-riscv64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-lm32 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-microblazeel 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-ppc64abi32 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-i386 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-nios2 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-arm 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-cris 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-xtensa 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-i386 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-sh4 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-ppc64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-audio-sdl 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-tilegx 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-riscv32 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-mipsn32el 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-microblaze 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-riscv64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-ui-sdl 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-sh4eb 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-mips 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-modules 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-mips64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-ui-gtk 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-block-curl 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-ppc64le 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-s390x 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-alpha 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-ui-curses 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-sh4 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-mips64el 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-microblazeel 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-block-dmg-bz2 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-i386 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-mips 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-audio-oss 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-hppa 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-sparc32plus 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-cris 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-microblaze 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-xtensaeb 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-or1k 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-unicore32 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-sparc 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-sh4 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-arm 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-lang 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-aarch64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-xtensaeb 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-armeb 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-mipsel 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-nios2 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-sparc64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-alpha 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-block-ssh 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-x86_64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-hppa 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-mips64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-aarch64_be 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-arm 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-lm32 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-img 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-mips64el 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-m68k 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-riscv32 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-tricore 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-sparc 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-x86_64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-nios2 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-ppc64abi32 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-sh4eb 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-cris 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-guest-agent 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-mipsn32 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-microblazeel 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-m68k 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-ppc64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-xtensa 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-i386 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-ppc 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-riscv64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-doc 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
ivshmem-tools 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-xtensa 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-sparc64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-aarch64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-mipsel 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-moxie 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-ppc 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-or1k 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-audio-alsa 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-block-nfs 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-s390x 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-s390x 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-lang 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-s390x 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-block-nfs 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-lm32 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-mips64el 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-sparc32plus 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-sh4 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-sparc64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-i386 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-mipsel 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-cris 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-ppc64abi32 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-guest-agent 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-m68k 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-riscv64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-audio-alsa 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-riscv64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-m68k 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-moxie 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-riscv32 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-audio-oss 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-microblaze 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-sh4eb 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-sparc64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-x86_64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-nios2 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-alpha 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-mips64el 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-unicore32 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-x86_64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-aarch64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-ppc 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-img 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-modules 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-block-ssh 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-audio-sdl 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-armeb 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-mipsn32 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-hppa 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-doc 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-sparc 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-xtensaeb 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-xtensa 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-i386 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-xtensaeb 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-or1k 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-sh4 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-tilegx 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-aarch64_be 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-xtensa 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-block-curl 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-microblazeel 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-microblaze 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-ppc64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-ui-sdl 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-block-dmg-bz2 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-riscv32 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-or1k 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-mips 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-mipsel 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-arm 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-cris 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-ui-curses 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-mipsn32el 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-alpha 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-mips 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-ppc64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-hppa 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
ivshmem-tools 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-tricore 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-aarch64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-ui-gtk 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-sparc 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-mips64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-nios2 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-microblazeel 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-mips64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-sh4eb 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-ppc 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-arm 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-ppc64le 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-riscv64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-microblaze 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-sh4eb 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-hppa 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-cris 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-audio-alsa 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-cris 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-microblazeel 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-s390x 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-alpha 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-img 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-arm 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-sparc 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-mips 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-mipsel 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-x86_64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-mips 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-block-curl 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-sh4 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-sparc 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-microblazeel 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-m68k 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-xtensa 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-doc 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-nios2 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-mips64el 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-sparc32plus 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-audio-sdl 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-moxie 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-aarch64_be 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-riscv64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-riscv32 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-aarch64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-mipsn32 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ui-gtk 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-mips64el 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ui-spice-app 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-guest-agent 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ui-curses 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-or1k 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-ppc 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
ivshmem-tools 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ppc 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-unicore32 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-ppc64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-microblaze 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-armeb 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-block-ssh 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-i386 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-alpha 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-nios2 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-xtensaeb 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-lang 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-or1k 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-xtensa 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-arm 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-s390x 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-xtensaeb 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-mips64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-block-dmg-bz2 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-i386 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ppc64abi32 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-tilegx 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-m68k 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-lm32 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-aarch64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-sh4eb 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ui-sdl 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ppc64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-modules 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-audio-oss 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-sparc64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-hppa 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-sh4 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ppc64le 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-tricore 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-block-nfs 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-mipsel 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-x86_64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-riscv32 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-sparc64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-mips64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-mipsn32el 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-hppa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-mips 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-s390x 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-x86_64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-riscv64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-ppc64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-mipsel 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-sparc64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-cris 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-microblazeel 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-aarch64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-riscv32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-mips64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-sh4eb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-tricore 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ppc64abi32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-mipsel 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-or1k 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-img 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-riscv32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ui-spice-app 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-nios2 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-sh4 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ppc64le 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-s390x 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-m68k 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-audio-sdl 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ui-sdl 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-mips64el 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ui-gtk 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-xtensa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-alpha 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-i386 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-microblaze 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-aarch64_be 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-guest-agent 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ppc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-lang 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-sh4eb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-microblaze 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-lm32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-unicore32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ppc64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-arm 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-xtensaeb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-block-nfs 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-xtensaeb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-hppa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-sh4 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-block-ssh 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-block-dmg-bz2 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-m68k 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-armeb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-i386 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-mipsn32el 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-audio-alsa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-sparc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-mips64el 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-x86_64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-block-curl 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-mipsn32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
ivshmem-tools 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-doc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-rx 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-sparc64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-mips 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-mips64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-arm 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-modules 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ui-curses 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-moxie 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-audio-oss 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-sparc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-aarch64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-audio-pa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-or1k 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-cris 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-riscv64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-nios2 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-microblazeel 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-sparc32plus 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-xtensa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-ppc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-tilegx 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-alpha 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-sh4 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-aarch64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-mips 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
ivshmem-tools 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-arm 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-i386 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ppc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-img 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-tilegx 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-sh4eb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-block-dmg-bz2 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-riscv64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-block-curl 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-m68k 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-sparc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-block-nfs 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-rx 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-microblazeel 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-tricore 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-audio-sdl 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-sparc64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ui-gtk 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-xtensaeb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-aarch64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-cris 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-alpha 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-sh4eb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-s390x 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-armeb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-aarch64_be 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-ppc64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-or1k 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-s390x 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-doc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-nios2 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-lang 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-riscv32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-or1k 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-riscv64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-sparc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-x86_64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ui-spice-app 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-sh4 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-alpha 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ppc64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-guest-agent 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-hppa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-mipsel 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-block-ssh 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-mips 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-audio-pa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-x86_64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-sparc32plus 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-lm32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-modules 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-mips64el 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-mips64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-microblazeel 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-mipsn32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-microblaze 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-xtensa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-xtensa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-mips64el 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ui-curses 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-m68k 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-moxie 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-unicore32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-cris 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-mips64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-i386 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-audio-oss 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-nios2 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ppc64le 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ppc64abi32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-arm 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-microblaze 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ui-sdl 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-mipsel 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-mipsn32el 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-audio-alsa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-sparc64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-hppa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-ppc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-riscv32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-xtensaeb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 qemu 4.2.1 Potentially vulnerable Emulators shaba@altlinux.org
ALT Sisyphus qemu 5.0.0 Potentially vulnerable Emulators shaba@altlinux.org
Amazon Linux 1
main
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 1
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 1
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 1
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 1
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 2 qemu 3.1.0 Potentially vulnerable Unspecified -
Amazon Linux 2 qemu 3.1.0 Potentially vulnerable Unspecified -
Amazon Linux 2 qemu 3.1.0 Potentially vulnerable Unspecified -
Amazon Linux 2 qemu 3.1.0 Potentially vulnerable Unspecified -
Amazon Linux 2 qemu 3.1.0 Potentially vulnerable Unspecified -
Amazon Linux 2 qemu-guest-agent 2.8.0 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 qemu-guest-agent 2.8.0 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 2 qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 2 qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 2 qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
AOSC qemu 5.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-aarch64-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-alpha-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-arm-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-armeb-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-cris-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-i386-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-m68k-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-microblaze-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-microblazeel-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-mips-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-mips64-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-mips64el-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-mipsel-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-mipsn32-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-mipsn32el-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-or32-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-ppc-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-ppc64-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-ppc64abi32-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-ppc64le-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-s390x-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-sh4-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-sh4eb-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-sparc-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-sparc32plus-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-sparc64-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-tilegx-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-user-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-x86-64-static 3.1.1 Potentially vulnerable admin fallback-mnt-aosc@repology
Arch
extra
qemu 5.0.0 Potentially vulnerable - -
Arch
extra
qemu-arch-extra 5.0.0 Potentially vulnerable - -
Arch
extra
qemu-block-gluster 5.0.0 Potentially vulnerable - -
Arch
extra
qemu-block-iscsi 5.0.0 Potentially vulnerable - -
Arch
extra
qemu-block-rbd 5.0.0 Potentially vulnerable - -
Arch
extra
qemu-guest-agent 5.0.0 Potentially vulnerable - -
Arch
extra
qemu-headless 5.0.0 Potentially vulnerable - -
Arch
extra
qemu-headless-arch-extra 5.0.0 Potentially vulnerable - -
AUR qemu-arch-extra-git 5.1.0.rc2.r0.g5772f2b1fc - fredbezies@aur
AUR qemu-block-gluster-git 5.1.0.rc2.r0.g5772f2b1fc - fredbezies@aur
AUR qemu-block-iscsi-git 5.1.0.rc2.r0.g5772f2b1fc - fredbezies@aur
AUR qemu-block-rbd-git 5.1.0.rc2.r0.g5772f2b1fc - fredbezies@aur
AUR qemu-git 5.1.0.rc2.r0.g5772f2b1fc - fredbezies@aur
AUR qemu-guest-agent-git 5.1.0.rc2.r0.g5772f2b1fc - fredbezies@aur
AUR qemu-headless-arch-extra-git 5.1.0.rc2.r0.g5772f2b1fc - fredbezies@aur
AUR qemu-headless-git 5.1.0.rc2.r0.g5772f2b1fc - fredbezies@aur
AUR qemu-minimal-git 2.11.0.r57280.1fa0f627d0 - fallback-mnt-aur@repology
AUR qemu-user-static-bin 5.0 Potentially vulnerable - jerryxiao@aur
AUR qemu-user-static 5.0.0 Potentially vulnerable - crab2313@aur
AUR qemu-arm-static 5.0.0r3 Potentially vulnerable - robertfoster@aur
AUR qemu-guest-agent-windows 2.10.0 Potentially vulnerable - arcnmx@aur
AUR qemu-lite 2.7.1 Potentially vulnerable - pdxjohnny@aur
Astra Orel Stable
main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Astra Orel Current
main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Ataraxia Linux qemu 5.0.0 Potentially vulnerable virt nagakamira@gmail.com
CentOS 6
os
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 6
updates
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 6
updates
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 6
updates
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 6
updates
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 6
updates
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 6
updates
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 7
os
qemu-guest-agent 2.12.0 Potentially vulnerable System Environment/Daemons -
CentOS 7
os
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
CentOS 7
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
CentOS 7
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
CentOS 8
AppStream
qemu-kvm 2.12.0 Potentially vulnerable Development/Tools bugs@centos.org
CentOS 8
AppStream
qemu-kvm 2.12.0 Potentially vulnerable Development/Tools bugs@centos.org
Chakra
desktop
qemu 3.0.0 Potentially vulnerable - -
Chakra
desktop
qemu-arch-extra 3.0.0 Potentially vulnerable - -
Chakra
desktop
qemu-block-gluster 3.0.0 Potentially vulnerable - -
Chakra
desktop
qemu-block-iscsi 3.0.0 Potentially vulnerable - -
Chakra
desktop
qemu-block-rbd 3.0.0 Potentially vulnerable - -
Chakra
desktop
qemu-guest-agent 3.0.0 Potentially vulnerable - -
Chocolatey Qemu 2020.07.29 - -
CRUX 3.4
opt
qemu-agent 4.0.0 Potentially vulnerable - tek@serverop.de
CRUX 3.4
opt
qemu-all 4.0.0 Potentially vulnerable - tek@serverop.de
CRUX 3.4
opt
qemu 4.0.0 Potentially vulnerable - tek@serverop.de
CRUX 3.5
opt
qemu-agent 4.2.0 Potentially vulnerable - tek@serverop.de
CRUX 3.5
opt
qemu-all 4.2.0 Potentially vulnerable - tek@serverop.de
CRUX 3.5
opt
qemu 4.2.0 Potentially vulnerable - tek@serverop.de
Debian Oldstable
oldstable/main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Debian Stable
stable/main
qemu 3.1 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Debian Testing
testing/main
qemu 5.0 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Debian Unstable
main
qemu 5.0 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Debian Unstable
main
qemu 5.0 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Deepin
main
qemu 2.12 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Devuan 1.0 (Jessie)
jessie/main
qemu 2.1 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Devuan 2.0 (ASCII)
ascii/main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
qemu 3.1 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Devuan 4.0 (Chimaera)
chimaera/main
qemu 5.0 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Devuan Unstable
unstable/main
qemu 5.0 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
distri qemu 4.2.0 Potentially vulnerable - -
DistroWatch.com qemu 5.0.0 Potentially vulnerable - -
DPorts emulators/qemu-devel 4.2.0 Potentially vulnerable emulators bofh@freebsd.org
DPorts emulators/qemu 4.1.1 Potentially vulnerable emulators bofh@freebsd.org
DPorts emulators/qemu-utils 4.1.1 Potentially vulnerable emulators ken@freebsd.org
EPEL 7 qemu 2.0.0 Potentially vulnerable Development/Tools -
Exherbo
virtualization
app-virtualization/qemu 4.2.0 Potentially vulnerable app-virtualization fallback-mnt-exherbo@repology
Exherbo
virtualization
app-virtualization/qemu 3.1.1.1 Potentially vulnerable app-virtualization fallback-mnt-exherbo@repology
Fedora 26
updates
qemu 2.9.1 Potentially vulnerable Development/Tools -
Fedora 26
release
qemu 2.9.0 Potentially vulnerable Development/Tools -
Fedora 27
updates
qemu 2.10.2 Potentially vulnerable Development/Tools -
Fedora 27
release
qemu 2.10.0 Potentially vulnerable Development/Tools -
Fedora 28
updates
qemu 2.11.2 Potentially vulnerable Unspecified -
Fedora 28
release
qemu 2.11.1 Potentially vulnerable Unspecified -
Fedora 29
updates
qemu 3.0.1 Potentially vulnerable Unspecified -
Fedora 29
release
qemu 3.0.0 Potentially vulnerable Unspecified -
Fedora 30
updates
qemu 3.1.1 Potentially vulnerable Unspecified -
Fedora 30
release
qemu 3.1.0 Potentially vulnerable Unspecified -
Fedora 31
updates
qemu 4.1.1 Potentially vulnerable Unspecified -
Fedora 31
release
qemu 4.1.0 Potentially vulnerable Unspecified -
Fedora 32
release
qemu 4.2.0 Potentially vulnerable Unspecified -
Fedora Rawhide qemu 5.0.0 Potentially vulnerable Unspecified -
FreeBSD Ports emulators/qemu-utils 4.2.1 Potentially vulnerable emulators ken@freebsd.org
FreeBSD Ports emulators/qemu 4.2.1 Potentially vulnerable emulators bofh@freebsd.org
FreeBSD Ports emulators/qemu-devel 4.2.0 Potentially vulnerable emulators bofh@freebsd.org
FreeBSD Ports emulators/qemu-user-static 3.1.0 Potentially vulnerable emulators emulation@freebsd.org
freshcode.club qemu 2.8.0 Potentially vulnerable - -
Funtoo 1.4
core-kit
app-emulation/qemu 5.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
Funtoo 1.4
core-kit
app-emulation/qemu 4.2.0 Potentially vulnerable app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
Funtoo 1.4
nokit
app-emulation/qemu-guest-agent 4.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
Funtoo 1.4
nokit
app-emulation/qemu-guest-agent 3.1.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
Gentoo app-emulation/qemu 9999 app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
Gentoo app-emulation/qemu-guest-agent 5.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
Gentoo app-emulation/qemu 5.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
Gentoo app-emulation/qemu 5.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
Gentoo app-emulation/qemu-guest-agent 4.2.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
Gentoo app-emulation/qemu-guest-agent 4.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
Gentoo app-emulation/qemu-guest-agent 3.1.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
GNU Guix qemu 5.0.0 Potentially vulnerable - -
GNU Guix qemu-minimal 5.0.0 Potentially vulnerable - -
GoboLinux QEMU 5.0.0 Potentially vulnerable - -
GoboLinux Qemu-Kvm 1.0rc2 Potentially vulnerable - -
HaikuPorts master app-emulation/qemu 3.1.1.1 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.11.1 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.10.0 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.9.0 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.8.1 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.7.0 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.1.2 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.1.0 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.0.0 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 1.7.0 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 0.15.1 Potentially vulnerable app-emulation -
Homebrew qemu 5.0.0 Potentially vulnerable - -
Hyperbola
extra
qemu 3.1.0 Potentially vulnerable - -
Hyperbola
extra
qemu-arch-extra 3.1.0 Potentially vulnerable - -
Hyperbola
extra
qemu-block-gluster 3.1.0 Potentially vulnerable - -
Hyperbola
extra
qemu-block-iscsi 3.1.0 Potentially vulnerable - -
Hyperbola
extra
qemu-block-rbd 3.1.0 Potentially vulnerable - -
Hyperbola
extra
qemu-guest-agent 3.1.0 Potentially vulnerable - -
Hyperbola
extra
qemu-headless 3.1.0 Potentially vulnerable - -
Hyperbola
extra
qemu-headless-arch-extra 3.1.0 Potentially vulnerable - -
Hyperbola
community
qemu-static 3.1.0 Potentially vulnerable - -
Hyperbola
community
binfmt-qemu-static 2.9.1 Potentially vulnerable - -
Kali Linux Rolling
main
qemu 5.0 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
KISS Linux Community
community
qemu 5.0.0 Potentially vulnerable - james@jedavies.dev
Kwort 4.3.2 qemu 2.11.1 Potentially vulnerable - -
Kwort 4.3.3 qemu 4.0.0 Potentially vulnerable - -
Kwort 4.3.4 qemu 4.2.0 Potentially vulnerable - -
LiGurOS 20.1
nokit
app-emulation/qemu 9999 app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
LiGurOS 20.1
nokit
app-emulation/qemu-guest-agent 5.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS 20.1
nokit
app-emulation/qemu 5.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
LiGurOS 20.1
nokit
app-emulation/qemu 5.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
LiGurOS 20.1
nokit
app-emulation/qemu-guest-agent 4.2.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS 20.1
nokit
app-emulation/qemu-guest-agent 4.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS 20.1
nokit
app-emulation/qemu-guest-agent 3.1.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS 20.7
nokit
app-emulation/qemu 9999 app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
LiGurOS 20.7
nokit
app-emulation/qemu-guest-agent 5.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS 20.7
nokit
app-emulation/qemu 5.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
LiGurOS 20.7
nokit
app-emulation/qemu 5.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
LiGurOS 20.7
nokit
app-emulation/qemu-guest-agent 4.2.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS 20.7
nokit
app-emulation/qemu-guest-agent 4.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS 20.7
nokit
app-emulation/qemu-guest-agent 3.1.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
Linuxbrew qemu 5.0.0 Potentially vulnerable - -
MacPorts qemu 5.0.0 Potentially vulnerable emulators raimue@macports, raimue@github
Mageia 6
core/release
qemu 2.8.1.1 Potentially vulnerable Emulators -
Mageia 7
core/release
qemu 4.0.0 Potentially vulnerable Emulators -
Mageia Cauldron
core/release
qemu 5.0.0 Potentially vulnerable Emulators -
Manjaro Stable
extra
qemu-arch-extra 5.0.0 Potentially vulnerable - -
Manjaro Stable
extra
qemu-block-gluster 5.0.0 Potentially vulnerable - -
Manjaro Stable
extra
qemu-block-iscsi 5.0.0 Potentially vulnerable - -
Manjaro Stable
extra
qemu-block-rbd 5.0.0 Potentially vulnerable - -
Manjaro Stable
extra
qemu-guest-agent 5.0.0 Potentially vulnerable - -
Manjaro Stable
extra
qemu-headless 5.0.0 Potentially vulnerable - -
Manjaro Stable
extra
qemu-headless-arch-extra 5.0.0 Potentially vulnerable - -
Manjaro Stable
extra
qemu 5.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu 5.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu-arch-extra 5.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu-block-gluster 5.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu-block-iscsi 5.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu-block-rbd 5.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu-guest-agent 5.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu-headless 5.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu-headless-arch-extra 5.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu 5.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu-arch-extra 5.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu-block-gluster 5.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu-block-iscsi 5.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu-block-rbd 5.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu-guest-agent 5.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu-headless 5.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu-headless-arch-extra 5.0.0 Potentially vulnerable - -
MSYS2 mingw
x86_64
mingw-w64-x86_64-qemu 5.0.0 Potentially vulnerable - alexpux@gmail.com
MSYS2 mingw
i686
mingw-w64-i686-qemu 5.0.0 Potentially vulnerable - alexpux@gmail.com
nixpkgs stable qemu 4.2.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs stable qemu-host-cpu-only 4.2.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs stable qemu-host-cpu-only-for-vm-tests 4.2.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs stable qemu-utils 4.2.0 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable qemu-xen-host-cpu-only 4.2.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs stable qemu-xen-host-cpu-only 4.2.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs stable qemu-xen-host-cpu-only 4.2.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs stable qemu-xen-host-cpu-only 4.2.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs stable qemu-xen-host-cpu-only 4.2.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs stable qemu-xen-host-cpu-only 4.2.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs unstable qemu 5.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs unstable qemu-host-cpu-only 5.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs unstable qemu-host-cpu-only-for-vm-tests 5.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs unstable qemu-utils 5.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs unstable qemu-xen-host-cpu-only 5.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs unstable qemu-xen-host-cpu-only 5.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs unstable qemu-xen-host-cpu-only 5.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs unstable qemu-xen-host-cpu-only 5.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs unstable qemu-xen-host-cpu-only 5.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
nixpkgs unstable qemu-xen-host-cpu-only 5.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com
Npackd Stable QEMU 2.6 Potentially vulnerable Tools -
Npackd Stable QEMU 2.4 Potentially vulnerable Tools -
Npackd Stable QEMU 2.2.1 Potentially vulnerable Tools -
Npackd Stable QEMU 2.2 Potentially vulnerable Tools -
Npackd Stable QEMU 1.5.3 Potentially vulnerable Tools -
Npackd Stable QEMU 1.5.2 Potentially vulnerable Tools -
Npackd Stable QEMU 1.5.1 Potentially vulnerable Tools -
Npackd Stable QEMU 1.4 Potentially vulnerable Tools -
OpenBSD Ports emulators/qemu 5.0.0 Potentially vulnerable emulators brad@comstyle.com
openEuler 20.03
source
qemu 4.0.1 Potentially vulnerable Unspecified -
OpenMandriva 3.0
main/updates
qemu 2.12.1 Potentially vulnerable Emulators cris@beebgames.com
OpenMandriva 3.0
main/updates
qemu 2.12.0~rc2 Potentially vulnerable Emulators nobodydead@gmail.com
OpenMandriva 4.0
main/release
qemu 4.0.0 Potentially vulnerable Unspecified nobodydead@gmail.com
OpenMandriva 4.1
main/release
qemu 4.2.0 Potentially vulnerable Unspecified nobodydead@gmail.com
OpenMandriva Rolling
main/release
qemu 5.0.0 Potentially vulnerable Unspecified bero@lindev.ch
OpenMandriva Cooker
main/release
qemu 5.1.0 Potentially vulnerable Unspecified bero@lindev.ch
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
main/oss
qemu 2.9.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
main/oss
qemu-linux-user 2.9.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
main/oss
qemu-testsuite 2.9.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.0
updates/oss
qemu 2.11.2 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.0
updates/oss
qemu 2.11.2 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.0
updates/oss
qemu 2.11.2 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.0
main/oss
qemu 2.11.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.0
main/oss
qemu-linux-user 2.11.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.0
main/oss
qemu-testsuite 2.11.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu-linux-user 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu-linux-user 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu-linux-user 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu-linux-user 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu 3.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu-linux-user 3.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu-testsuite 3.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
main/oss
qemu 3.1.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
main/oss
qemu-linux-user 3.1.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
main/oss
qemu-testsuite 3.1.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu-linux-user 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu-testsuite 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
main/oss
qemu 4.2.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
main/oss
qemu-linux-user 4.2.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
main/oss
qemu-testsuite 4.2.0 Potentially vulnerable System/Emulators/PC -
openSUSE Tumbleweed qemu 5.0.0 Potentially vulnerable System/Emulators/PC -
openSUSE Tumbleweed qemu-linux-user 5.0.0 Potentially vulnerable System/Emulators/PC -
openSUSE Tumbleweed qemu-testsuite 5.0.0 Potentially vulnerable System/Emulators/PC -
OpenWrt 17.01 x86_64
packages
qemu-bridge-helper 2.6.2 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 17.01 x86_64
packages
qemu-ga 2.6.2 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 17.01 x86_64
packages
qemu-x86_64-softmmu 2.6.2 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 17.01 x86_64
packages
virtio-console-helper 2.6.2 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 17.01 x86_64
packages
qemu-arm-softmmu 2.6.2 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 17.01 x86_64
packages
qemu-blobs 2.6.2 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 18.06 x86_64
packages
qemu-arm-softmmu 2.11.1 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 18.06 x86_64
packages
qemu-blobs 2.11.1 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 18.06 x86_64
packages
qemu-bridge-helper 2.11.1 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 18.06 x86_64
packages
qemu-ga 2.11.1 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 18.06 x86_64
packages
qemu-x86_64-softmmu 2.11.1 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 18.06 x86_64
packages
virtio-console-helper 2.11.1 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
qemu-arm-softmmu 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
qemu-blobs 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
qemu-bridge-helper 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
qemu-ga 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
qemu-img 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
qemu-nbd 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
qemu-x86_64-softmmu 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
virtio-console-helper 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
Parabola
extra
qemu 5.0.0 Potentially vulnerable - -
Parabola
extra
qemu-arch-extra 5.0.0 Potentially vulnerable - -
Parabola
extra
qemu-block-gluster 5.0.0 Potentially vulnerable - -
Parabola
extra
qemu-block-iscsi 5.0.0 Potentially vulnerable - -
Parabola
extra
qemu-block-rbd 5.0.0 Potentially vulnerable - -
Parabola
extra
qemu-guest-agent 5.0.0 Potentially vulnerable - -
Parabola
extra
qemu-headless 5.0.0 Potentially vulnerable - -
Parabola
extra
qemu-headless-arch-extra 5.0.0 Potentially vulnerable - -
Parabola
libre
qemu-user-static 3.1.0 Potentially vulnerable - -
Parabola
libre
qemu-user-static-binfmt 3.1.0 Potentially vulnerable - -
Pardus
main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Pardus
updates/main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Pardus
updates/main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Pardus
updates/main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Pardus
updates/main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Pardus
updates/main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Parrot
main
qemu 5.0 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
PCLinuxOS qemu 0.14.0 Potentially vulnerable Emulators -
Pisi Linux
main
qemu 4.2.0 Potentially vulnerable app:console admins@pisilinux.org
pkgsrc current emulators/qemu 5.0.0 Potentially vulnerable emulators pkgsrc-users@netbsd.org
PLD Linux qemu 5.0.0 Potentially vulnerable - -
PureOS Amber qemu 3.1 Potentially vulnerable misc pureos-project@lists.puri.sm
PureOS Amber qemu 2.12 Potentially vulnerable misc pureos-project@lists.puri.sm
PureOS landing qemu 5.0 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Raspbian Oldstable
main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Raspbian Oldstable
main
qemu-kvm 1.1.2 Potentially vulnerable misc mjt@tls.msk.ru, agx@sigxcpu.org, jluebbe@debian.org
Raspbian Stable
main
qemu 3.1 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Raspbian Stable
main
qemu-kvm 1.1.2 Potentially vulnerable misc mjt@tls.msk.ru, agx@sigxcpu.org, jluebbe@debian.org
Raspbian Testing
main
qemu 5.0 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Raspbian Testing
main
qemu-kvm 1.1.2 Potentially vulnerable misc mjt@tls.msk.ru, agx@sigxcpu.org, jluebbe@debian.org
Ravenports qemu 5.0.0 Potentially vulnerable emulators fallback-mnt-ravenports@repology
ReactOS rapps QEMU 1.5.50 Potentially vulnerable - -
RebornOS qemu-user-static 5.0.0 Potentially vulnerable - -
Rosa 2014.1
main/updates
qemu 2.5.1.1 Potentially vulnerable - -
Rosa 2014.1
main/release
qemu 1.5.0 Potentially vulnerable - -
Rosa 2016.1
main/updates
qemu 2.10.1 Potentially vulnerable - -
Rosa 2016.1
main/testing
qemu 2.10.1 Potentially vulnerable - -
Rosa 2016.1
main/release
qemu 2.5.1.1 Potentially vulnerable - -
Rosa 2019.1
main/release
qemu 5.0.0 Potentially vulnerable Emulators alexander@mezon.ru
Rosa Server 6.9
base/release
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
qemu-guest-agent 2.5.0 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.3
base/release
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools alex2048@mail.ru
Rosa Server 7.5
base/release
qemu-guest-agent 2.8.0 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.5
base/release
qemu-guest-agent 2.5.0 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.5
base/release
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools alex2048@mail.ru
Rosa Server 7.5
base/release
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools alex2048@mail.ru
Salix 14.2 qemu 4.1.1 Potentially vulnerable - -
Scientific Linux 7.x qemu-guest-agent 2.12.0 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x qemu-guest-agent 2.12.0 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x qemu-guest-agent 2.8.0 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x qemu-guest-agent 2.8.0 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x qemu-guest-agent 2.5.0 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x qemu-guest-agent 2.3.0 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x qemu-guest-agent 2.1.0 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scoop
main
qemu 5.1.0-rc2 Potentially vulnerable - -
SlackBuilds system/qemu 4.1.0 Potentially vulnerable system kingbeowulf@gmail.com
SlackBuilds system/qemu-guest-agent 2.12.0 Potentially vulnerable system atelszewski@gmail.com
SliTaz Cooking qemu 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Cooking qemu-arm 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Cooking qemu-mips 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Cooking qemu-ppc 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Cooking qemu-x86_64 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Cooking qemu-light 1.2.0 Potentially vulnerable misc pankso@slitaz.org
SliTaz Next qemu-arm 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Next qemu-mips 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Next qemu-x86_64 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Next qemu 2.0.2 Potentially vulnerable misc|for x86 hardware pascal.bellard@slitaz.org
SliTaz Next qemu-light 2.0.2 Potentially vulnerable misc devel@slitaz.org
Solus qemu 5.0.0 Potentially vulnerable virt joshua@streambits.io
Solus qemu-dbginfo 5.0.0 Potentially vulnerable debug joshua@streambits.io
T2 SDE qemu 5.0.0 Potentially vulnerable extra/emulator rene@t2-project.org
Trisquel 6.0
toutatis/main
qemu-kvm 1.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 6.0
toutatis-updates/main
qemu-kvm 1.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos-updates/main
qemu 2.0.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Trisquel 7.0
belenos/main
qemu 2.0.0rc1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Trisquel 8.0
flidas/main
qemu 2.5 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Trisquel 8.0
flidas-updates/main
qemu 2.5 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Ubuntu 12.04
precise/main
qemu-kvm 1.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 12.04
precise-updates/main
qemu-kvm 1.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty-updates/main
qemu 2.0.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Ubuntu 14.04
trusty/main
qemu 2.0.0rc1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Ubuntu 16.04
xenial/main
qemu 2.5 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Ubuntu 16.04
xenial-updates/main
qemu 2.5 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Ubuntu 18.04
bionic/main
qemu 2.11 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Ubuntu 18.04
bionic-updates/main
qemu 2.11 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Ubuntu 19.10
eoan/main
qemu 4.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Ubuntu 19.10
eoan-updates/main
qemu 4.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Ubuntu 20.04
focal/main
qemu 4.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Ubuntu 20.04
focal-updates/main
qemu 4.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Ubuntu 20.10
groovy/main
qemu 5.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Void Linux x86_64
x86_64
qemu 5.0.0 Potentially vulnerable - helmut@pozimski.eu
Void Linux x86_64
x86_64
qemu-ga 5.0.0 Potentially vulnerable - helmut@pozimski.eu
Void Linux x86_64
x86_64
qemu-user-static 5.0.0 Potentially vulnerable - helmut@pozimski.eu
Wikidata QEMU 4.2.0 Potentially vulnerable - -

Absent in repositories

  • antiX-16
  • antiX-17
  • antiX-19
  • AppGet
  • Arch Testing
  • BlackArch
  • BlackBox 6
  • BlackBox 7
  • Buckaroo
  • BunsenLabs Hydrogen
  • BunsenLabs Hydrogen/Jessie Backports
  • BunsenLabs Helium
  • BunsenLabs Helium/Stretch Backports
  • Calculate
  • Carbs Linux
  • Chakra Staging
  • Chakra Testing
  • ConanCenter
  • CPAN
  • MetaCPAN
  • CRAN
  • crates.io
  • Cygwin
  • Deb Multimedia Unstable
  • Debian Stable Backports
  • Debian Experimental
  • ELRepo el7
  • ELRepo el7 Testing
  • Entware
  • EPEL 6
  • EPEL 8
  • F-Droid
  • Gentoo overlay GURU
  • Gentoo overlay Pentoo
  • GNU Elpa
  • Hackage
  • Homebrew Casks
  • Homebrew tap Brewsci/bio
  • HP-UX 11.31
  • IBM i
  • just-install
  • KaOS
  • KaOS Build
  • KDE neon Dev Stable
  • KDE neon Dev Unstable
  • KDE neon Experimental
  • KDE neon User
  • KDE neon User LTS
  • KISS Linux Games
  • KISS Linux Main
  • Libregamewiki
  • Linux Mint 17
  • Linux Mint 17.1
  • Linux Mint 17.2
  • Linux Mint 17.3
  • Linux Mint 18
  • Linux Mint 18.1
  • Linux Mint 18.2
  • Linux Mint 18.3
  • Linux Mint 19
  • Linux Mint 19.1
  • Linux Mint 19.2
  • Linux Mint 19.3
  • Linux Mint 20.0
  • LuaRocks
  • Maemo Fremantle
  • MELPA
  • MSYS2 msys2
  • MX Linux MX-15
  • MX Linux MX-15 Testing
  • MX Linux MX-16
  • MX Linux MX-17
  • MX Linux MX-17 Testing
  • MX Linux MX-19
  • MX Linux MX-19 Testing
  • NeuroDebian data
  • NeuroDebian Debian 8
  • NeuroDebian Debian 9
  • NeuroDebian Debian 10
  • NeuroDebian Debian Unstable
  • NeuroDebian Ubuntu 14.04
  • NeuroDebian Ubuntu 16.04
  • NeuroDebian Ubuntu 18.04
  • NeuroDebian Ubuntu 19.04
  • Npackd Stable64
  • Npackd Unstable
  • OpenIndiana packages
  • OpenPKG
  • openSUSE Education Tumbleweed
  • openSUSE Emulators Tumbleweed
  • openSUSE Games Tumbleweed
  • openSUSE Graphics Tumbleweed
  • openSUSE Hardware:SDR Tumbleweed
  • openSUSE Multimedia:Apps Tumbleweed
  • openSUSE Multimedia:Libs Tumbleweed
  • openSUSE Network Tumbleweed
  • openSUSE Science Tumbleweed
  • openSUSE Security Tumbleweed
  • OS4Depot
  • PackMan openSUSE Leap 42.3
  • PackMan openSUSE Leap 15.0
  • PackMan openSUSE Leap 15.1
  • PackMan openSUSE Leap 15.2
  • PackMan openSUSE Tumbleweed
  • PackMan SLE 12
  • PackMan SLE 15
  • Parabola Testing
  • Pisi Linux Contrib
  • RPM Fusion EL 6
  • RPM Fusion EL 7
  • RPM Fusion EL 8
  • RPM Fusion Fedora 28
  • RPM Fusion Fedora 29
  • RPM Fusion Fedora 30
  • RPM Fusion Fedora 31
  • RPM Fusion Fedora Rawhide
  • RPM Sphere
  • RubyGems
  • Sabayon
  • Sabayon for-gentoo
  • Siduction
  • Siduction Experimental
  • Slackware 14.2
  • Slackware current
  • Slackware64 14.2
  • Slackware64 current
  • Slackwarearm 14.2
  • Slackwarearm current
  • Sparky Stable
  • Sparky Testing
  • Stackage LTS Haskell
  • Stackage Nightly
  • Tails stable
  • Tails devel
  • Termux
  • Trisquel 6.0 backports
  • Trisquel 7.0 backports
  • Trisquel 8.0 backports
  • Ubuntu 12.04 Backports
  • Ubuntu 14.04 Backports
  • Ubuntu 16.04 Backports
  • Ubuntu 18.04 Backports
  • Ubuntu 19.10 Backports
  • Ubuntu 19.10 Proposed
  • Ubuntu 20.04 Proposed
  • Ubuntu 20.10 Proposed
  • UnitedRPMs Fedora 30
  • UnitedRPMs Fedora 31
  • UnitedRPMs Fedora 32
  • UnitedRPMs Fedora 33
  • Vcpkg
  • Whonix
  • Whonix Developers
  • winget
  • YACP