Versions Packages Information History CVEs Related Badges Report

Versions for qemu

1314 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
qemu-i386 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-sparc64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-mipsel 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-ppc 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-unicore32 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-ppc64le 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-microblaze 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-gtk 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-doc 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-m68k 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-armeb 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-mips 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-ppc64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-microblazeel 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-guest-agent 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-img 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-lang 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-ppc64abi32 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-microblazeel 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-xtensaeb 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-aarch64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-tricore 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-sparc32plus 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-arm 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-s390x 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-cris 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-x86_64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-mipsn32 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-hppa 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-nios2 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-mips64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-cris 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-xtensa 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-or1k 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-tilegx 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-ppc64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-riscv64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-lm32 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-aarch64_be 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-riscv64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-or1k 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-mips64el 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-riscv32 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-moxie 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-i386 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-dbg 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-x86_64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-microblaze 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-mipsn32el 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-arm 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-aarch64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-nios2 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-mipsel 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-sh4eb 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-alpha 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-ppc 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-riscv32 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-mips64el 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-xtensa 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-mips 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-s390x 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-sparc 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-xtensaeb 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-alpha 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-user 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-hppa 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-sparc 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-sparc64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-m68k 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-mips64 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-sh4eb 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-sh4 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-sh4 4.2.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
qemu-system-ppcemb 3.0.0 Potentially vulnerable - awilfox@adelielinux.org
AIX Open Source Packages qemu 0.9.1 Potentially vulnerable - -
AlmaLinux 8
AppStream
qemu-kvm 4.2.0 Potentially vulnerable Development/Tools packager@almalinux.org
Alpine Linux 3.8
main
qemu-ui-curses 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
ivshmem-tools 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-sparc64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-lm32 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-mips64el 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-cris 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-sh4 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-mipsel 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-or1k 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-xtensa 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-doc 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-mips64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-ppc64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-audio-alsa 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-audio-oss 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-modules 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-lang 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-ui-gtk 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-sparc64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-xtensaeb 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-ppc64abi32 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-arm 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-ppc 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-riscv64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-block-dmg-bz2 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-sh4 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-sh4eb 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-x86_64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-ppc64le 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-sparc 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-mipsel 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-block-ssh 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-mipsn32 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-audio-sdl 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-microblaze 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-riscv64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-m68k 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-tricore 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-mips 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-nios2 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-arm 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-mipsn32el 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-alpha 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-xtensa 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-moxie 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-block-curl 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-i386 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-cris 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-sparc32plus 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-unicore32 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-mips64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-tilegx 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-sparc 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-mips 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-x86_64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-ppc 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-block-nfs 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-hppa 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-alpha 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-nios2 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-s390x 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-armeb 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-sh4eb 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-ppcemb 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-riscv32 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-img 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-microblaze 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-m68k 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-hppa 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-mips64el 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-riscv32 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-microblazeel 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-guest-agent 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-aarch64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-s390x 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-i386 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-or1k 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-ppc64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-aarch64_be 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-xtensaeb 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-ui-sdl 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-system-microblazeel 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
qemu-aarch64 2.12.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-mipsn32el 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-microblaze 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-riscv64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-ui-sdl 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-sh4eb 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-mips 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-modules 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-mips64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-ui-gtk 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-block-curl 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-ppc64le 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-s390x 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-alpha 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-audio-sdl 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-tilegx 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-riscv32 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-ui-curses 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-sh4 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-mips64el 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-microblazeel 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-block-dmg-bz2 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-i386 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-mips 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-audio-oss 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-hppa 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-sparc32plus 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-cris 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-microblaze 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-xtensaeb 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-or1k 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-unicore32 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-sparc 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-sh4 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-arm 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-lang 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-aarch64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-xtensaeb 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-armeb 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-mipsel 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-nios2 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-ppc64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-sparc64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-alpha 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-block-ssh 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-x86_64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-hppa 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-mips64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-aarch64_be 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-arm 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-lm32 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-img 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-mips64el 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-m68k 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-riscv32 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-tricore 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-sparc 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-x86_64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-nios2 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-ppc64abi32 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-sh4eb 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-cris 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-guest-agent 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-mipsn32 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-microblazeel 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-m68k 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-ppc64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-xtensa 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-i386 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-ppc 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-riscv64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-doc 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
ivshmem-tools 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-xtensa 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-sparc64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-aarch64 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-mipsel 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-moxie 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-ppc 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-or1k 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-audio-alsa 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-block-nfs 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
qemu-system-s390x 3.1.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-block-curl 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-nios2 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-m68k 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-tricore 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-sh4 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-m68k 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-alpha 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-ui-gtk 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-ui-curses 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-xtensa 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-sh4 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-or1k 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-ppc 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-mipsn32 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-mipsel 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-xtensaeb 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-armeb 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-block-dmg-bz2 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-sparc64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-lang 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-aarch64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-ppc64abi32 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-riscv64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-arm 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-mips64el 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-or1k 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-mips64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-xtensaeb 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-ppc64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-ppc64le 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-s390x 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-x86_64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-cris 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-mips64el 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-ppc 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-arm 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-sh4eb 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-microblaze 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-mips 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-sparc 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-x86_64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-i386 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-sh4eb 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-hppa 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-mips64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-hppa 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-audio-sdl 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-riscv32 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-tilegx 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-img 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-sparc 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-doc 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-audio-oss 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-sparc32plus 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-mipsn32el 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-mips 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-block-ssh 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-mipsel 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-block-nfs 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
ivshmem-tools 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-audio-alsa 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-ppc64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-lm32 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-unicore32 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-moxie 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-aarch64_be 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-cris 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-alpha 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-s390x 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-guest-agent 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-riscv32 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-xtensa 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-sparc64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-ui-sdl 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-nios2 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-microblazeel 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-modules 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-microblaze 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-aarch64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-i386 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-microblazeel 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
qemu-system-riscv64 4.0.1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-cris 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-armeb 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ppc64le 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-mipsel 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-m68k 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-microblazeel 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-alpha 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-nios2 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-microblazeel 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-aarch64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-sparc64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-xtensa 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ui-gtk 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-or1k 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-tricore 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-hppa 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ui-curses 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-microblaze 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-block-dmg-bz2 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-m68k 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-img 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-i386 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-audio-alsa 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-sh4eb 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-sparc64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-i386 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-modules 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-block-nfs 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-nios2 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-aarch64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-sparc 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-sh4 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ppc64abi32 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ppc 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-mips 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-s390x 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-riscv32 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-moxie 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-block-ssh 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-x86_64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-x86_64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-xtensa 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-mipsn32 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-block-curl 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-sparc32plus 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-mips64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-mipsel 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-arm 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-cris 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-unicore32 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-doc 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-hppa 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-sparc 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-mipsn32el 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-riscv64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
ivshmem-tools 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-ppc 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-sh4eb 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-audio-sdl 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-mips64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-mips 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-aarch64_be 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-mips64el 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ui-spice-app 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-mips64el 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ppc64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-xtensaeb 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-guest-agent 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-riscv32 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-s390x 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-sh4 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-audio-oss 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-arm 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-ui-sdl 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-xtensaeb 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-microblaze 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-tilegx 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-lm32 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-ppc64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-system-or1k 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-lang 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-riscv64 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
community
qemu-alpha 4.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ppc64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-moxie 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-arm 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-alpha 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-guest-agent 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-tilegx 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-microblaze 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-xtensa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-audio-oss 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-armeb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-tricore 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-unicore32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-sparc64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-lang 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-block-ssh 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-modules 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-riscv32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-audio-alsa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-sparc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-doc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-rx 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-sh4 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-microblaze 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-sparc64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-hppa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-mips 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-riscv64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-alpha 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-mips64el 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-mipsel 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-x86_64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-mips64el 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-mips 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-s390x 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-microblazeel 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-block-nfs 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-audio-pa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-mips64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-xtensaeb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-cris 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ppc64le 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-arm 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-sparc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-i386 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ppc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-lm32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-ppc 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-ppc64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-mipsel 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ui-curses 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-audio-sdl 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-aarch64_be 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ui-spice-app 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-sh4eb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-x86_64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-or1k 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-m68k 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-riscv32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-hppa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-xtensaeb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ppc64abi32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-aarch64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ui-sdl 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-microblazeel 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
ivshmem-tools 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-nios2 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-sh4 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-block-curl 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-img 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-i386 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-mipsn32 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-or1k 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-mips64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-s390x 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-mipsn32el 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-sh4eb 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-ui-gtk 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-xtensa 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-riscv64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-sparc32plus 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-nios2 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-aarch64 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-system-m68k 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-cris 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
community
qemu-block-dmg-bz2 5.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-x86_64 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-audio-sdl 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-xtensaeb 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-s390x 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-arm 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-mips64 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-m68k 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-hw-display-qxl 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-i386 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-mips64el 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-sh4eb 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-ppc 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-mips 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-doc 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-block-curl 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-m68k 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-microblaze 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-or1k 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-aarch64_be 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-mipsn32el 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-mipsel 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-mipsel 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-sparc 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-mips64el 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-sparc32plus 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-block-dmg-bz2 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-mips 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-lang 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-guest-agent 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-sparc64 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-ppc64le 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-modules 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-hw-display-virtio-vga 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-audio-spice 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-img 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-chardev-spice 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-mipsn32 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-ui-gtk 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-ppc64 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-mips64 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-riscv64 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-ui-egl-headless 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-hw-display-virtio-gpu-pci 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-tricore 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-nios2 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-ui-spice-app 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-arm 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-sh4 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-riscv32 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-hppa 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-audio-pa 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-ui-opengl 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-ui-curses 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-cris 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-sparc64 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-armeb 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-ppc64 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-rx 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-microblaze 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-cris 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-block-nfs 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-block-ssh 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-sh4 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-riscv64 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-x86_64 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-hw-usb-redirect 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-riscv32 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-xtensa 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-sh4eb 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-xtensa 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-microblazeel 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-audio-alsa 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-ui-spice-core 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-hppa 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-or1k 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-moxie 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-alpha 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-i386 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-sparc 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-aarch64 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-microblazeel 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-ppc 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-ui-sdl 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-hw-display-virtio-gpu 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-aarch64 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-audio-oss 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-nios2 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-s390x 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-avr 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-system-alpha 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
community
qemu-xtensaeb 5.2.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-hw-display-virtio-gpu-pci 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-hw-display-qxl 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-microblaze 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-cris 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-cris 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-mipsn32el 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-ui-sdl 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-guest-agent 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-microblazeel 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-mipsn32 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-avr 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-sparc64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-audio-sdl 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-aarch64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-i386 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-modules 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-mipsel 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-alpha 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-m68k 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-mipsel 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-m68k 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-x86_64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-s390x 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-ppc64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-xtensa 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-sh4eb 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-arm 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-audio-alsa 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-ui-spice-core 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-ui-spice-app 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-ui-egl-headless 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-ppc 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-microblazeel 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-mips 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-block-ssh 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-riscv64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-riscv32 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-sh4eb 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-xtensaeb 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-mips 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-riscv64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-img 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-doc 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-lang 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-or1k 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-arm 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-chardev-spice 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-nios2 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-nios2 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-sparc64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-mips64el 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-audio-spice 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-xtensa 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-hw-display-virtio-vga 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-ui-opengl 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-or1k 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-sh4 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-block-nfs 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-ppc64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-hw-usb-redirect 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-mips64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-x86_64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-block-dmg-bz2 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-alpha 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-ui-curses 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-audio-oss 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-block-curl 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-armeb 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-sparc 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-riscv32 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-i386 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-ui-gtk 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-audio-pa 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-moxie 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-mips64el 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-hppa 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-microblaze 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-sh4 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-hppa 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-xtensaeb 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-hw-s390x-virtio-gpu-ccw 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-ppc64le 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-aarch64_be 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-aarch64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-s390x 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-mips64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-rx 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-sparc 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-hw-display-virtio-gpu 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-system-tricore 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-sparc32plus 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
community
qemu-ppc 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-sparc32plus 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ui-opengl 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ppc64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-avr 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-nios2 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ui-egl-headless 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-sh4eb 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-moxie 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-audio-sdl 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-mipsel 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-riscv64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-riscv32 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ui-gtk 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-xtensa 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-sparc 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-mipsel 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-s390x 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-microblaze 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-audio-spice 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-modules 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-guest-agent 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-audio-pa 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-mipsn32el 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-mips 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-mips 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-xtensa 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-hppa 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-arm 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-x86_64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ppc 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-xtensaeb 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-sh4 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-arm 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-m68k 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-chardev-spice 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-microblazeel 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-block-ssh 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-xtensaeb 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-riscv64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-hw-display-virtio-gpu 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-x86_64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-hppa 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-doc 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-alpha 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-lang 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-hw-display-virtio-gpu-pci 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-audio-oss 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-cris 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-sparc 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-hw-display-virtio-vga 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-mips64el 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-or1k 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-armeb 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-hw-usb-redirect 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ui-spice-core 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-sh4eb 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-microblaze 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-ppc64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-mips64el 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-hw-s390x-virtio-gpu-ccw 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-s390x 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-or1k 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-i386 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-block-nfs 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-riscv32 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-m68k 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-block-dmg-bz2 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-nios2 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-ppc 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-aarch64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-microblazeel 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-alpha 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-cris 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-aarch64_be 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-i386 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-mips64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-sh4 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-hw-display-qxl 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-tricore 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ui-curses 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-block-curl 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-sparc64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-sparc64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ui-spice-app 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ppc64le 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-mips64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-mipsn32 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-audio-alsa 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-img 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-aarch64 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-system-rx 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
qemu-ui-sdl 6.0.0 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 qemu 5.2.0 Potentially vulnerable Emulators shaba@altlinux.org
ALT Sisyphus qemu 6.0.0 Potentially vulnerable Emulators shaba@altlinux.org
Amazon Linux 1
main
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 1
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 1
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 1
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 1
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 1
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 1
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 1
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 2 qemu 3.1.0 Potentially vulnerable Unspecified -
Amazon Linux 2 qemu 3.1.0 Potentially vulnerable Unspecified -
Amazon Linux 2 qemu 3.1.0 Potentially vulnerable Unspecified -
Amazon Linux 2 qemu 3.1.0 Potentially vulnerable Unspecified -
Amazon Linux 2 qemu 3.1.0 Potentially vulnerable Unspecified -
Amazon Linux 2 qemu 3.1.0 Potentially vulnerable Unspecified -
Amazon Linux 2 qemu 3.1.0 Potentially vulnerable Unspecified -
Amazon Linux 2 qemu 3.1.0 Potentially vulnerable Unspecified -
Amazon Linux 2 qemu 3.1.0 Potentially vulnerable Unspecified -
Amazon Linux 2 qemu-guest-agent 2.8.0 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 qemu-guest-agent 2.8.0 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 2 qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 2 qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Amazon Linux 2 qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
AOSC qemu 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-aarch64-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-alpha-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-arm-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-armeb-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-cris-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-i386-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-m68k-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-microblaze-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-microblazeel-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-mips-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-mips64-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-mips64el-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-mipsel-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-mipsn32-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-mipsn32el-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-or32-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-ppc-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-ppc64-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-ppc64le-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-s390x-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-sh4-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-sh4eb-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-sparc-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-sparc32plus-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-sparc64-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-user-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
AOSC qemu-x86-64-static 6.0.0 Potentially vulnerable admin fallback-mnt-aosc@repology
Apertis v2020
v2020/sdk
qemu 3.1 Potentially vulnerable main pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Apertis v2020
v2020-updates/sdk
qemu 3.1 Potentially vulnerable main pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Apertis v2021
v2021/sdk
qemu 3.1 Potentially vulnerable main pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Apertis v2022 Development
v2022dev2/sdk
qemu 5.2 Potentially vulnerable main pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Arch
extra
qemu-headless 6.0.0 Potentially vulnerable - -
Arch
extra
qemu-guest-agent 6.0.0 Potentially vulnerable - -
Arch
extra
qemu-block-iscsi 6.0.0 Potentially vulnerable - -
Arch
extra
qemu-headless-arch-extra 6.0.0 Potentially vulnerable - -
Arch
extra
qemu-block-rbd 6.0.0 Potentially vulnerable - -
Arch
extra
qemu-block-gluster 6.0.0 Potentially vulnerable - -
Arch
extra
qemu-arch-extra 6.0.0 Potentially vulnerable - -
Arch
extra
qemu 6.0.0 Potentially vulnerable - -
AUR qemu-arch-extra-git 6.0.0.r1407.g453d9c61dd - fredbezies@aur
AUR qemu-block-gluster-git 6.0.0.r1407.g453d9c61dd - fredbezies@aur
AUR qemu-block-iscsi-git 6.0.0.r1407.g453d9c61dd - fredbezies@aur
AUR qemu-block-rbd-git 6.0.0.r1407.g453d9c61dd - fredbezies@aur
AUR qemu-git 6.0.0.r1407.g453d9c61dd - fredbezies@aur
AUR qemu-guest-agent-git 6.0.0.r1407.g453d9c61dd - fredbezies@aur
AUR qemu-headless-arch-extra-git 6.0.0.r1407.g453d9c61dd - fredbezies@aur
AUR qemu-headless-git 6.0.0.r1407.g453d9c61dd - fredbezies@aur
AUR qemu-user-static 6.0.0 Potentially vulnerable - crab2313@aur
AUR qemu-arm-static 6.0.0r4 Potentially vulnerable - robertfoster@aur
AUR qemu-user-static-bin 5.2 Potentially vulnerable - jerryxiao@aur
AUR qemu-guest-agent-windows 2.10.0 Potentially vulnerable - arcnmx@aur
AUR qemu-lite 2.7.1 Potentially vulnerable - pdxjohnny@aur
Artix
world
qemu-arch-extra 6.0.0 Potentially vulnerable - -
Artix
world
qemu-block-rbd 6.0.0 Potentially vulnerable - -
Artix
world
qemu 6.0.0 Potentially vulnerable - -
Artix
world
qemu-guest-agent 6.0.0 Potentially vulnerable - -
Artix
world
qemu-block-gluster 6.0.0 Potentially vulnerable - -
Artix
world
qemu-headless 6.0.0 Potentially vulnerable - -
Artix
world
qemu-headless-arch-extra 6.0.0 Potentially vulnerable - -
Artix
world
qemu-block-iscsi 6.0.0 Potentially vulnerable - -
Astra Orel Stable
main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Astra Orel Current
main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Ataraxia GNU/Linux qemu 6.0.0 Potentially vulnerable virt nagakamira@gmail.com
CentOS 6
os
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 6
updates
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 6
updates
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 6
updates
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 6
updates
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 6
updates
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 6
updates
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 6
updates
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools -
CentOS 7
os
qemu-guest-agent 2.12.0 Potentially vulnerable System Environment/Daemons -
CentOS 7
os
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
CentOS 7
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
CentOS 7
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
CentOS 7
updates
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
CentOS 8
AppStream
qemu-kvm 4.2.0 Potentially vulnerable Development/Tools bugs@centos.org
CentOS 8
AppStream
qemu-kvm 4.2.0 Potentially vulnerable Development/Tools bugs@centos.org
CentOS 8
AppStream
qemu-kvm 4.2.0 Potentially vulnerable Development/Tools bugs@centos.org
CentOS 8
AppStream
qemu-kvm 4.2.0 Potentially vulnerable Development/Tools bugs@centos.org
CentOS 8
AppStream
qemu-kvm 4.2.0 Potentially vulnerable Development/Tools bugs@centos.org
CentOS 8
AppStream
qemu-kvm 2.12.0 Potentially vulnerable Development/Tools bugs@centos.org
CentOS 8
AppStream
qemu-kvm 2.12.0 Potentially vulnerable Development/Tools bugs@centos.org
CentOS 8
AppStream
qemu-kvm 2.12.0 Potentially vulnerable Development/Tools bugs@centos.org
CentOS 8
PowerTools
qemu-kvm 2.12.0 Potentially vulnerable Development/Tools bugs@centos.org
Chakra
desktop
qemu-block-gluster 3.0.0 Potentially vulnerable - -
Chakra
desktop
qemu-block-iscsi 3.0.0 Potentially vulnerable - -
Chakra
desktop
qemu-block-rbd 3.0.0 Potentially vulnerable - -
Chakra
desktop
qemu-guest-agent 3.0.0 Potentially vulnerable - -
Chakra
desktop
qemu 3.0.0 Potentially vulnerable - -
Chakra
desktop
qemu-arch-extra 3.0.0 Potentially vulnerable - -
Chaotic-AUR qemu-headless-git 6.0.0.r1700.g3ccf6cd0e3 - -
Chaotic-AUR qemu-block-gluster-git 6.0.0.r1700.g3ccf6cd0e3 - -
Chaotic-AUR qemu-block-rbd-git 6.0.0.r1700.g3ccf6cd0e3 - -
Chaotic-AUR qemu-block-iscsi-git 6.0.0.r1700.g3ccf6cd0e3 - -
Chaotic-AUR qemu-arch-extra-git 6.0.0.r1700.g3ccf6cd0e3 - -
Chaotic-AUR qemu-headless-arch-extra-git 6.0.0.r1700.g3ccf6cd0e3 - -
Chaotic-AUR qemu-guest-agent-git 6.0.0.r1700.g3ccf6cd0e3 - -
Chaotic-AUR qemu-git 6.0.0.r1700.g3ccf6cd0e3 - -
Chocolatey Qemu 2021.5.5 - -
CRUX 3.4
opt
qemu-agent 4.0.0 Potentially vulnerable - tek@serverop.de
CRUX 3.4
opt
qemu-all 4.0.0 Potentially vulnerable - tek@serverop.de
CRUX 3.4
opt
qemu 4.0.0 Potentially vulnerable - tek@serverop.de
CRUX 3.5
opt
qemu-agent 5.2.0 Potentially vulnerable - tek@serverop.de
CRUX 3.5
opt
qemu 5.2.0 Potentially vulnerable - tek@serverop.de
CRUX 3.5
opt
qemu-all 4.2.0 Potentially vulnerable - tek@serverop.de
CRUX 3.6
opt
qemu 6.0.0 Potentially vulnerable - jue@crux.nu
Debian Oldstable
oldstable/main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Debian Stable
stable/main
qemu 3.1 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Debian Stable Backports
main
qemu 5.2 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Debian Testing
testing/main
qemu 5.2 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Debian Unstable
main
qemu 5.2 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Debian Experimental
main
qemu 6.0 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Deepin
main
qemu 3.1.6 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Devuan 1.0 (Jessie)
jessie/main
qemu 2.1 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Devuan 2.0 (ASCII)
ascii/main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
qemu 3.1 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Devuan 4.0 (Chimaera)
chimaera/main
qemu 5.2 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Devuan Unstable
unstable/main
qemu 5.2 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
distri qemu 4.2.0 Potentially vulnerable - -
DistroWatch.com qemu 6.0.0 Potentially vulnerable - -
DPorts emulators/qemu-devel 5.1.0.20201019 Potentially vulnerable emulators bofh@freebsd.org
DPorts emulators/qemu 5.0.1 Potentially vulnerable emulators bofh@freebsd.org
DPorts emulators/qemu-utils 4.2.1 Potentially vulnerable emulators ken@freebsd.org
EPEL 7 qemu 2.0.0 Potentially vulnerable Development/Tools -
Exherbo
virtualization
app-virtualization/qemu 5.2.0 Potentially vulnerable app-virtualization fallback-mnt-exherbo@repology
Exherbo
virtualization
app-virtualization/qemu 3.1.1.1 Potentially vulnerable app-virtualization fallback-mnt-exherbo@repology
Fedora 26
updates
qemu 2.9.1 Potentially vulnerable Development/Tools -
Fedora 26
release
qemu 2.9.0 Potentially vulnerable Development/Tools -
Fedora 27
updates
qemu 2.10.2 Potentially vulnerable Development/Tools -
Fedora 27
release
qemu 2.10.0 Potentially vulnerable Development/Tools -
Fedora 28
updates
qemu 2.11.2 Potentially vulnerable Unspecified -
Fedora 28
release
qemu 2.11.1 Potentially vulnerable Unspecified -
Fedora 29
updates
qemu 3.0.1 Potentially vulnerable Unspecified -
Fedora 29
release
qemu 3.0.0 Potentially vulnerable Unspecified -
Fedora 30
updates
qemu 3.1.1 Potentially vulnerable Unspecified -
Fedora 30
release
qemu 3.1.0 Potentially vulnerable Unspecified -
Fedora 31
updates
qemu 4.1.1 Potentially vulnerable Unspecified -
Fedora 31
release
qemu 4.1.0 Potentially vulnerable Unspecified -
Fedora 32
updates
qemu 4.2.1 Potentially vulnerable Unspecified -
Fedora 32
release
qemu 4.2.0 Potentially vulnerable Unspecified -
Fedora 33
release
qemu 5.1.0 Potentially vulnerable Unspecified -
Fedora 33
updates
qemu 5.1.0 Potentially vulnerable Unspecified -
Fedora 34
release
qemu 5.2.0 Potentially vulnerable Unspecified -
Fedora 34
updates
qemu 5.2.0 Potentially vulnerable Unspecified -
Fedora Rawhide qemu 6.0.0 Potentially vulnerable Unspecified -
FreeBSD Ports emulators/qemu-devel 5.1.0.20201019 Potentially vulnerable emulators bofh@freebsd.org
FreeBSD Ports emulators/qemu-guest-agent 5.0.1 Potentially vulnerable emulators zhecka@gmail.com
FreeBSD Ports emulators/qemu 5.0.1 Potentially vulnerable emulators bofh@freebsd.org
FreeBSD Ports emulators/qemu-utils 4.2.1 Potentially vulnerable emulators ken@freebsd.org
FreeBSD Ports emulators/qemu-user-static 3.1.0 Potentially vulnerable emulators emulation@freebsd.org
freshcode.club qemu 2.8.0 Potentially vulnerable - -
Funtoo 1.4
core-kit
app-emulation/qemu 5.2.0 Potentially vulnerable app-emulation fallback-mnt-funtoo@repology
Funtoo 1.4
core-kit
app-emulation/qemu-guest-agent 4.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
Funtoo 1.4
core-kit
app-emulation/qemu-guest-agent 3.1.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
Gentoo app-emulation/qemu 9999 app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
Gentoo app-emulation/qemu-guest-agent 6.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
Gentoo app-emulation/qemu 6.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
Gentoo app-emulation/qemu-guest-agent 5.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
Gentoo app-emulation/qemu-guest-agent 4.2.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
GNU Guix qemu 6.0.0 Potentially vulnerable - -
GNU Guix qemu-minimal 6.0.0 Potentially vulnerable - -
GoboLinux QEMU 5.0.0 Potentially vulnerable - -
GoboLinux Qemu-Kvm 1.0rc2 Potentially vulnerable - -
HaikuPorts master app-emulation/qemu 6.0.0 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 3.1.1.1 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.11.1 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.10.0 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.9.0 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.8.1 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.7.0 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.1.2 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.1.0 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 2.0.0 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 1.7.0 Potentially vulnerable app-emulation -
HaikuPorts master app-emulation/qemu 0.15.1 Potentially vulnerable app-emulation -
Homebrew qemu 6.0.0 Potentially vulnerable - -
Hyperbola
extra
qemu-block-gluster 3.1.0 Potentially vulnerable - -
Hyperbola
extra
qemu-block-iscsi 3.1.0 Potentially vulnerable - -
Hyperbola
community
qemu-static 3.1.0 Potentially vulnerable - -
Hyperbola
extra
qemu-block-rbd 3.1.0 Potentially vulnerable - -
Hyperbola
extra
qemu-arch-extra 3.1.0 Potentially vulnerable - -
Hyperbola
extra
qemu-guest-agent 3.1.0 Potentially vulnerable - -
Hyperbola
extra
qemu-headless 3.1.0 Potentially vulnerable - -
Hyperbola
extra
qemu-headless-arch-extra 3.1.0 Potentially vulnerable - -
Hyperbola
extra
qemu 3.1.0 Potentially vulnerable - -
Hyperbola
community
binfmt-qemu-static 2.9.1 Potentially vulnerable - -
Kali Linux Rolling
main
qemu 5.2 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
KISS Linux Community
community
qemu 6.0.0 Potentially vulnerable - james@jedavies.dev
LiGurOS stable app-emulation/qemu 9999 app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
LiGurOS stable app-emulation/qemu 6.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
LiGurOS stable app-emulation/qemu-guest-agent 6.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS stable app-emulation/qemu-guest-agent 5.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS stable app-emulation/qemu-guest-agent 4.2.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS develop app-emulation/qemu 9999 app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
LiGurOS develop app-emulation/qemu-guest-agent 6.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS develop app-emulation/qemu 6.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, slyfox@gentoo.org, virtualization@gentoo.org
LiGurOS develop app-emulation/qemu-guest-agent 5.0.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
LiGurOS develop app-emulation/qemu-guest-agent 4.2.0 Potentially vulnerable app-emulation tamiko@gentoo.org, virtualization@gentoo.org
Linuxbrew qemu 6.0.0 Potentially vulnerable - -
MacPorts qemu 5.2.0 Potentially vulnerable emulators raimue@macports, raimue@github
Mageia 7
core/release
qemu 4.0.0 Potentially vulnerable Emulators -
Mageia 8
core/release
qemu 5.2.0 Potentially vulnerable Emulators -
Mageia Cauldron
core/release
qemu 6.0.0 Potentially vulnerable Emulators -
Manjaro Stable
extra
qemu-headless-arch-extra 6.0.0 Potentially vulnerable - -
Manjaro Stable
extra
qemu-guest-agent 6.0.0 Potentially vulnerable - -
Manjaro Stable
extra
qemu-block-rbd 6.0.0 Potentially vulnerable - -
Manjaro Stable
extra
qemu-block-gluster 6.0.0 Potentially vulnerable - -
Manjaro Stable
extra
qemu 6.0.0 Potentially vulnerable - -
Manjaro Stable
extra
qemu-block-iscsi 6.0.0 Potentially vulnerable - -
Manjaro Stable
extra
qemu-headless 6.0.0 Potentially vulnerable - -
Manjaro Stable
extra
qemu-arch-extra 6.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu 6.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu-guest-agent 6.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu-arch-extra 6.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu-block-iscsi 6.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu-block-gluster 6.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu-headless 6.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu-block-rbd 6.0.0 Potentially vulnerable - -
Manjaro Testing
extra
qemu-headless-arch-extra 6.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu-headless 6.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu-arch-extra 6.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu-block-rbd 6.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu-block-iscsi 6.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu 6.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu-headless-arch-extra 6.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu-block-gluster 6.0.0 Potentially vulnerable - -
Manjaro Unstable
extra
qemu-guest-agent 6.0.0 Potentially vulnerable - -
MSYS2 mingw
x86_64
mingw-w64-x86_64-qemu 6.0.0 Potentially vulnerable - -
MSYS2 mingw
i686
mingw-w64-i686-qemu 6.0.0 Potentially vulnerable - -
nixpkgs stable qemu-utils 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs stable qemu 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs stable qemu 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs stable qemu-host-cpu-only 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs stable qemu-host-cpu-only-for-vm-tests 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs stable qemu-xen-host-cpu-only 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs stable qemu-xen-host-cpu-only 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs stable qemu-xen-host-cpu-only 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs stable qemu-xen-host-cpu-only 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs unstable qemu-utils 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs unstable qemu 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs unstable qemu 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs unstable qemu-host-cpu-only 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs unstable qemu-host-cpu-only-for-vm-tests 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs unstable qemu-xen-host-cpu-only 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs unstable qemu-xen-host-cpu-only 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs unstable qemu-xen-host-cpu-only 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
nixpkgs unstable qemu-xen-host-cpu-only 6.0.0 Potentially vulnerable - edolstra+nixpkgs@gmail.com, hi@alyssa.is
Npackd Stable QEMU 2.6 Potentially vulnerable Tools -
Npackd Stable QEMU 2.4 Potentially vulnerable Tools -
Npackd Stable QEMU 2.2.1 Potentially vulnerable Tools -
Npackd Stable QEMU 2.2 Potentially vulnerable Tools -
Npackd Stable QEMU 1.5.3 Potentially vulnerable Tools -
Npackd Stable QEMU 1.5.2 Potentially vulnerable Tools -
Npackd Stable QEMU 1.5.1 Potentially vulnerable Tools -
Npackd Stable QEMU 1.4 Potentially vulnerable Tools -
OpenBSD Ports emulators/qemu 6.0.0 Potentially vulnerable emulators brad@comstyle.com
OpenBSD Ports emulators/qemu 6.0.0 Potentially vulnerable emulators brad@comstyle.com
OpenBSD Ports emulators/qemu 6.0.0 Potentially vulnerable emulators brad@comstyle.com
openEuler 20.03
source
qemu 4.0.1 Potentially vulnerable Unspecified -
openmamba
devel
qemu 6.0.0 Potentially vulnerable Applications/Emulators silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
qemu 4.0.0 Potentially vulnerable Unspecified nobodydead@gmail.com
OpenMandriva Cooker
main/release
qemu 6.0.0 Potentially vulnerable Emulators bero@lindev.ch
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu 2.9.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-linux-user 2.9.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
updates/oss
qemu-testsuite 2.9.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
main/oss
qemu 2.9.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
main/oss
qemu-linux-user 2.9.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 42.3
main/oss
qemu-testsuite 2.9.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.0
updates/oss
qemu 2.11.2 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.0
updates/oss
qemu 2.11.2 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.0
updates/oss
qemu 2.11.2 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.0
main/oss
qemu 2.11.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.0
main/oss
qemu-linux-user 2.11.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.0
main/oss
qemu-testsuite 2.11.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu-linux-user 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu-linux-user 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu-linux-user 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu-linux-user 3.1.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu 3.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu-linux-user 3.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
updates/oss
qemu-testsuite 3.1.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
main/oss
qemu 3.1.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
main/oss
qemu-linux-user 3.1.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.1
main/oss
qemu-testsuite 3.1.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu-linux-user 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu-linux-user 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu-linux-user 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu-linux-user 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu-testsuite 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu-testsuite 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu-testsuite 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
updates/oss
qemu-testsuite 4.2.1 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
main/oss
qemu 4.2.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
main/oss
qemu-linux-user 4.2.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.2
main/oss
qemu-testsuite 4.2.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.3
main/oss
qemu 5.2.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.3
main/oss
qemu-linux-user 5.2.0 Potentially vulnerable System/Emulators/PC -
openSUSE Leap 15.3
main/oss
qemu-testsuite 5.2.0 Potentially vulnerable System/Emulators/PC -
openSUSE Tumbleweed
src-oss
qemu 6.0.0 Potentially vulnerable System/Emulators/PC -
openSUSE Tumbleweed
src-oss
qemu-linux-user 6.0.0 Potentially vulnerable System/Emulators/PC -
openSUSE Tumbleweed
src-oss
qemu-testsuite 6.0.0 Potentially vulnerable System/Emulators/PC -
OpenWrt 17.01 x86_64
packages
virtio-console-helper 2.6.2 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 17.01 x86_64
packages
qemu-arm-softmmu 2.6.2 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 17.01 x86_64
packages
qemu-blobs 2.6.2 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 17.01 x86_64
packages
qemu-bridge-helper 2.6.2 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 17.01 x86_64
packages
qemu-ga 2.6.2 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 17.01 x86_64
packages
qemu-x86_64-softmmu 2.6.2 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 18.06 x86_64
packages
qemu-arm-softmmu 2.11.1 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 18.06 x86_64
packages
qemu-blobs 2.11.1 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 18.06 x86_64
packages
qemu-bridge-helper 2.11.1 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 18.06 x86_64
packages
qemu-ga 2.11.1 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 18.06 x86_64
packages
qemu-x86_64-softmmu 2.11.1 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 18.06 x86_64
packages
virtio-console-helper 2.11.1 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
qemu-img 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
qemu-arm-softmmu 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
qemu-blobs 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
qemu-bridge-helper 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
qemu-ga 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
qemu-nbd 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
qemu-x86_64-softmmu 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
OpenWrt 19.07 x86_64
packages
virtio-console-helper 4.0.0 Potentially vulnerable utils yszhou4tech@gmail.com
Parabola
extra
qemu-block-iscsi 6.0.0 Potentially vulnerable - -
Parabola
extra
qemu-headless 6.0.0 Potentially vulnerable - -
Parabola
extra
qemu-arch-extra 6.0.0 Potentially vulnerable - -
Parabola
extra
qemu-block-gluster 6.0.0 Potentially vulnerable - -
Parabola
extra
qemu-block-rbd 6.0.0 Potentially vulnerable - -
Parabola
extra
qemu-headless-arch-extra 6.0.0 Potentially vulnerable - -
Parabola
extra
qemu-guest-agent 6.0.0 Potentially vulnerable - -
Parabola
extra
qemu 6.0.0 Potentially vulnerable - -
Parabola
libre
qemu-user-static 3.1.0 Potentially vulnerable - -
Parabola
libre
qemu-user-static-binfmt 3.1.0 Potentially vulnerable - -
Pardus 17
main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Pardus 17
updates/main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Pardus 17
updates/main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Pardus 17
updates/main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Pardus 17
updates/main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Pardus 17
updates/main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Pardus 19
main
qemu 3.1 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Pardus 19
updates/main
qemu 3.1 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Parrot
main
qemu 5.2 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
PCLinuxOS qemu 0.14.0 Potentially vulnerable Emulators -
Pisi Linux
main
qemu 4.2.0 Potentially vulnerable app:console admins@pisilinux.org
pkgsrc current emulators/qemu 6.0.0 Potentially vulnerable emulators pkgsrc-users@netbsd.org
PLD Linux qemu 5.2.0 Potentially vulnerable - -
PureOS Amber qemu 3.1 Potentially vulnerable misc pureos-project@lists.puri.sm
PureOS Amber qemu 2.12 Potentially vulnerable misc pureos-project@lists.puri.sm
PureOS landing qemu 5.2 Potentially vulnerable misc pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Raspbian Oldstable
main
qemu 2.8 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Raspbian Oldstable
main
qemu-kvm 1.1.2 Potentially vulnerable misc mjt@tls.msk.ru, agx@sigxcpu.org, jluebbe@debian.org
Raspbian Stable
main
qemu 3.1 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Raspbian Stable
main
qemu-kvm 1.1.2 Potentially vulnerable misc mjt@tls.msk.ru, agx@sigxcpu.org, jluebbe@debian.org
Raspbian Testing
main
qemu 5.2 Potentially vulnerable otherosfs pkg-qemu-devel@lists.alioth.debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Raspbian Testing
main
qemu-kvm 1.1.2 Potentially vulnerable misc mjt@tls.msk.ru, agx@sigxcpu.org, jluebbe@debian.org
Ravenports qemu 6.0.0 Potentially vulnerable emulators fallback-mnt-ravenports@repology
ReactOS rapps QEMU 1.5.50 Potentially vulnerable - -
RebornOS qemu-user-static 6.0.0 Potentially vulnerable - -
Rocky Linux 8
AppStream
qemu-kvm 4.2.0 Potentially vulnerable Development/Tools infrastructure@rockylinux.org
Rosa 2014.1
main/updates
qemu 2.5.1.1 Potentially vulnerable - -
Rosa 2014.1
main/release
qemu 1.5.0 Potentially vulnerable - -
Rosa 2016.1
main/testing
qemu 2.10.1 Potentially vulnerable - -
Rosa 2016.1
main/updates
qemu 2.10.1 Potentially vulnerable - -
Rosa 2016.1
main/release
qemu 2.5.1.1 Potentially vulnerable - -
Rosa 2019.1
main/release
qemu 5.2.0 Potentially vulnerable Emulators m.novosyolov@rosalinux.ru
Rosa Server 6.9
base/release
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
qemu-kvm 0.12.1.2 Potentially vulnerable Development/Tools andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
qemu-guest-agent 2.5.0 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.3
base/release
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools alex2048@mail.ru
Rosa Server 7.5
base/release
qemu-guest-agent 2.8.0 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.5
base/release
qemu-guest-agent 2.5.0 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.5
base/release
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools alex2048@mail.ru
Rosa Server 7.5
base/release
qemu-kvm 1.5.3 Potentially vulnerable Development/Tools alex2048@mail.ru
Salix 14.2 qemu 4.1.1 Potentially vulnerable - -
Scientific Linux 7.x qemu-guest-agent 2.12.0 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x qemu-guest-agent 2.12.0 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x qemu-guest-agent 2.8.0 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x qemu-guest-agent 2.8.0 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x qemu-guest-agent 2.5.0 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x qemu-guest-agent 2.3.0 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x qemu-guest-agent 2.1.0 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scientific Linux 7.x qemu-kvm 1.5.3 Potentially vulnerable Development/Tools -
Scoop
main
qemu 6.0.0 Potentially vulnerable - -
SlackBuilds system/qemu 6.0.0 Potentially vulnerable system kingbeowulf@gmail.com
SlackBuilds system/qemu-guest-agent 2.12.0 Potentially vulnerable system atelszewski@gmail.com
SliTaz Cooking qemu 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Cooking qemu-arm 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Cooking qemu-mips 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Cooking qemu-ppc 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Cooking qemu-x86_64 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Cooking qemu-light 1.2.0 Potentially vulnerable misc pankso@slitaz.org
SliTaz Next qemu-arm 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Next qemu-mips 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Next qemu-x86_64 2.0.2 Potentially vulnerable misc pascal.bellard@slitaz.org
SliTaz Next qemu 2.0.2 Potentially vulnerable misc|for x86 hardware pascal.bellard@slitaz.org
SliTaz Next qemu-light 2.0.2 Potentially vulnerable misc devel@slitaz.org
Solus qemu 5.0.1 Potentially vulnerable virt joshua@streambits.io
Solus qemu-dbginfo 5.0.1 Potentially vulnerable debug joshua@streambits.io
T2 SDE qemu 6.0.0 Potentially vulnerable extra/emulator rene@t2-project.org
Trisquel 6.0
toutatis/main
qemu-kvm 1.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 6.0
toutatis-updates/main
qemu-kvm 1.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos-updates/main
qemu 2.0.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Trisquel 7.0
belenos/main
qemu 2.0.0rc1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Trisquel 8.0
flidas-updates/main
qemu 2.5 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Trisquel 8.0
flidas/main
qemu 2.5 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Trisquel 9.0
etiona/main
qemu 2.11 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Trisquel 9.0
etiona-updates/main
qemu 2.11 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Ubuntu 14.04
trusty-updates/main
qemu 2.0.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Ubuntu 14.04
trusty/main
qemu 2.0.0rc1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Ubuntu 16.04
xenial/main
qemu 2.5 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Ubuntu 16.04
xenial-updates/main
qemu 2.5 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi, vagrant@debian.org
Ubuntu 18.04
bionic-updates/main
qemu 2.11 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Ubuntu 18.04
bionic/main
qemu 2.11 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Ubuntu 20.04
focal/main
qemu 4.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Ubuntu 20.04
focal-updates/main
qemu 4.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Ubuntu 20.10
groovy/main
qemu 5.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Ubuntu 20.10
groovy-updates/main
qemu 5.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, aurel32@debian.org, mjt@tls.msk.ru, riku.voipio@iki.fi
Ubuntu 21.04
hirsute-updates/main
qemu 5.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, mjt@tls.msk.ru, riku.voipio@iki.fi
Ubuntu 21.04
hirsute/main
qemu 5.2 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, mjt@tls.msk.ru, riku.voipio@iki.fi
Void Linux x86_64
x86_64
qemu 6.0.0 Potentially vulnerable - helmut@pozimski.eu
Void Linux x86_64
x86_64
qemu-ga 6.0.0 Potentially vulnerable - helmut@pozimski.eu
Void Linux x86_64
x86_64
qemu-user-static 6.0.0 Potentially vulnerable - orphan@voidlinux.org
Wikidata QEMU 6.0.0 Potentially vulnerable - -
winget QEMU 6.0.0 Potentially vulnerable - -