Versions Packages Information History CVEs Related Badges Report

Versions for readline

385 package(s) known

Repository Package name Version Category Maintainer(s)
AIX Open Source Packages readline 8.0 - -
AIX Open Source Packages readline 8.0 - -
AIX Open Source Packages readline 7.0 - -
AIX Open Source Packages readline 7.0 - -
AIX Open Source Packages readline 7.0 - -
AIX Open Source Packages readline 7.0 - -
AIX Open Source Packages readline 6.3 Potentially vulnerable - -
AIX Open Source Packages readline 6.3 Potentially vulnerable - -
AIX Open Source Packages readline 6.3 Potentially vulnerable - -
AIX Open Source Packages readline 6.3 Potentially vulnerable - -
AIX Open Source Packages readline 6.3 Potentially vulnerable - -
AIX Open Source Packages readline 6.2 Potentially vulnerable - -
AIX Open Source Packages readline 6.2 Potentially vulnerable - -
AIX Open Source Packages readline 6.2 Potentially vulnerable - -
AIX Open Source Packages readline 6.2 Potentially vulnerable - -
AIX Open Source Packages readline 6.2 Potentially vulnerable - -
AIX Open Source Packages readline 6.1 Potentially vulnerable - -
AIX Open Source Packages readline 6.1 Potentially vulnerable - -
AIX Open Source Packages readline 6.1 Potentially vulnerable - -
AIX Open Source Packages readline 6.0 Potentially vulnerable - -
AIX Open Source Packages readline 6.0 Potentially vulnerable - -
AIX Open Source Packages readline 6.0 Potentially vulnerable - -
AIX Open Source Packages readline 5.2 Potentially vulnerable - -
AIX Open Source Packages readline 5.2 Potentially vulnerable - -
AIX Open Source Packages readline 5.2 Potentially vulnerable - -
AIX Toolbox readline 8.0 System Environment/Libraries -
AIX Toolbox readline 8.0 System Environment/Libraries -
AIX Toolbox readline 7.0 System Environment/Libraries -
AlmaLinux 8
BaseOS
readline 7.0 Unspecified packager@cloudlinux.com
AlmaLinux 8
PowerTools
mingw-readline 6.2 Potentially vulnerable System Environment/Libraries packager@cloudlinux.com
Alpine Linux 3.8
main
libhistory 7.0p003 - ncopa@alpinelinux.org
Alpine Linux 3.8
main
readline 7.0p003 - ncopa@alpinelinux.org
Alpine Linux 3.8
main
readline-doc 7.0p003 - ncopa@alpinelinux.org
Alpine Linux 3.8
main
readline-dev 7.0p003 - ncopa@alpinelinux.org
Alpine Linux 3.9
main
libhistory 7.0p003 - ncopa@alpinelinux.org
Alpine Linux 3.9
main
readline-dev 7.0p003 - ncopa@alpinelinux.org
Alpine Linux 3.9
main
readline-doc 7.0p003 - ncopa@alpinelinux.org
Alpine Linux 3.9
main
readline 7.0p003 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
libhistory 8.0 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
readline-doc 8.0 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
readline 8.0 - ncopa@alpinelinux.org
Alpine Linux 3.10
main
readline-dev 8.0 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
readline-static 8.0p1 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
readline-dev 8.0p1 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
readline-doc 8.0p1 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
readline 8.0p1 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
libhistory 8.0p1 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
readline-dev 8.0p4 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
readline-doc 8.0p4 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
libhistory 8.0p4 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
readline-static 8.0p4 - ncopa@alpinelinux.org
Alpine Linux 3.12
main
readline 8.0p4 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
libhistory 8.1 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
readline-dev 8.1 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
readline 8.1 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
readline-static 8.1 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
readline-doc 8.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
readline 8.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
readline-static 8.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
libhistory 8.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
readline-dev 8.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
readline-doc 8.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
readline-doc 8.1p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
readline-static 8.1p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
readline-dev 8.1p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
readline 8.1p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
libhistory 8.1p1 - ncopa@alpinelinux.org
ALT Linux p9 readline 7.0p3 System/Libraries viy@altlinux.org
ALT Linux p9 readline5 5.2p14 Potentially vulnerable System/Libraries ldv@altlinux.org
ALT Linux p10 readline 7.0p3 System/Libraries viy@altlinux.org
ALT Linux p10 readline5 5.2p14 Potentially vulnerable System/Libraries ldv@altlinux.org
ALT Sisyphus readline 7.0p3 System/Libraries ldv@altlinux.org
ALT Sisyphus readline5 5.2p14 Potentially vulnerable System/Legacy libraries ldv@altlinux.org
Amazon Linux 1
main
readline 6.2 Potentially vulnerable System Environment/Libraries -
Amazon Linux 1
main
compat-readline5 5.2 Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 readline 6.2 Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 readline 6.2 Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 readline 6.2 Potentially vulnerable System Environment/Libraries -
Amazon Linux 2 compat-readline5 5.2 Potentially vulnerable Unspecified -
AOSC readline 8.1p1 libs fallback-mnt-aosc@repology
AOSC readline+32 6.3p008 Potentially vulnerable libs fallback-mnt-aosc@repology
Apertis v2020
v2020/development
readline 7.0 main doko@debian.org
Apertis v2020
v2020/target
readline5 5.2 Potentially vulnerable main packages@qa.debian.org
Apertis v2021
v2021/development
readline 7.0 main doko@debian.org
Apertis v2021
v2021/target
readline5 5.2 Potentially vulnerable main packages@qa.debian.org
Apertis v2022 Development
v2022dev2/development
readline 8.1 main doko@debian.org
Apertis v2022 Development
v2022dev2/target
readline5 5.2 Potentially vulnerable main packages@qa.debian.org
Arch
multilib
lib32-readline 8.1p001 - -
Arch
core
readline 8.1p001 - -
AUR readline-git 8.0.r4.gc5ad6be - chocobo1@aur
AUR mingw-w64-readline 8.1p001 - pingplug@aur
AUR readline7 7.0p005 - loathingkernel@aur
AUR libx32-readline 6.3p008 Potentially vulnerable - fantix@aur
AUR readline6 6.3p008 Potentially vulnerable - loathingkernel@aur
Artix
system
readline 8.1p001 - -
Astra Orel Stable
main
readline 7.0 libs doko@debian.org
Astra Orel Stable
main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Astra Orel Current
main
readline 7.0 libs doko@debian.org
Astra Orel Current
main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Ataraxia GNU/Linux readline 8.1p1 libs nagakamira@gmail.com
Carbs Linux
extra
readline 8.1p1 - cem@ckyln.com
CentOS 6
os
readline 6.0 Potentially vulnerable System Environment/Libraries -
CentOS 6
os
compat-readline5 5.2 Potentially vulnerable System Environment/Libraries -
CentOS 7
os
readline 6.2 Potentially vulnerable System Environment/Libraries -
CentOS 8
BaseOS
readline 7.0 Unspecified bugs@centos.org
CentOS 8
PowerTools
mingw-readline 6.2 Potentially vulnerable System Environment/Libraries bugs@centos.org
Chakra
core
readline 7.0p001 - -
ConanCenter readline 8.0 - -
CRUX 3.4
core
readline 7.0p5 - core-ports@crux.nu
CRUX 3.4
compat-32
readline-32 7.0p5 - compat-32-ports@crux.nu
CRUX 3.5
core
readline 8.0p4 - core-ports@crux.nu
CRUX 3.5
compat-32
readline-32 8.0p4 - compat-32-ports@crux.nu
CRUX 3.6
core
readline 8.1p1 - core-ports@crux.nu
CRUX 3.6
compat-32
readline-32 8.1p1 - compat-32-ports@crux.nu
Cygwin libreadline-devel 8.1 Libs brian.inglis@cygwin, eric.blake@cygwin
Cygwin libreadline7 8.1 Libs brian.inglis@cygwin, eric.blake@cygwin
Cygwin readline-debuginfo 8.1 Debug brian.inglis@cygwin, eric.blake@cygwin
Cygwin libreadline-devel 8.1 Libs brian.inglis@cygwin, eric.blake@cygwin
Cygwin libreadline7 8.1 Libs brian.inglis@cygwin, eric.blake@cygwin
Cygwin readline-debuginfo 8.1 Debug brian.inglis@cygwin, eric.blake@cygwin
Cygwin mingw64-i686-readline 7.0p1 Devel orphaned@cygwin
Cygwin mingw64-x86_64-readline 7.0p1 Devel orphaned@cygwin
Debian 8
jessie/main
readline6 6.3 Potentially vulnerable libs doko@debian.org
Debian 8
jessie/main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Debian 9
stretch/main
readline 7.0 misc doko@debian.org
Debian 9
stretch/main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Debian 10
buster/main
readline 7.0 misc doko@debian.org
Debian 10
buster/main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Debian 11
bullseye/main
readline 8.1 misc doko@debian.org
Debian 12
bookworm/main
readline 8.1 misc doko@debian.org
Debian Stable
stable/main
readline 8.1 misc doko@debian.org
Debian Testing
testing/main
readline 8.1 misc doko@debian.org
Debian Unstable
sid/main
readline 8.1 misc doko@debian.org
Deepin
main
readline 7.0 libs doko@debian.org
Deepin
main
readline5 5.2p1 Potentially vulnerable libs packages@qa.debian.org
Devuan 1.0 (Jessie)
jessie/main
readline6 6.3 Potentially vulnerable libs doko@debian.org
Devuan 1.0 (Jessie)
jessie/main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Devuan 2.0 (ASCII)
ascii/main
readline 7.0 misc doko@debian.org
Devuan 2.0 (ASCII)
ascii/main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Devuan 3.0 (Beowulf)
beowulf/main
readline 7.0 misc doko@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Devuan 4.0 (Chimaera)
chimaera/main
readline 8.1 misc doko@debian.org
Devuan Unstable
unstable/main
readline 8.1 misc doko@debian.org
distri readline 8.0 - -
DPorts devel/readline 8.1p1 devel sunpoet@freebsd.org
Entware
x64-k3.2
libreadline 8.1 libs fallback-mnt-entware@repology
Entware
aarch64-k3.10
libreadline 8.1 libs fallback-mnt-entware@repology
Entware
armv5sf-k3.2
libreadline 8.1 libs fallback-mnt-entware@repology
Entware
armv7sf-k2.6
libreadline 8.1 libs fallback-mnt-entware@repology
Entware
armv7sf-k3.2
libreadline 8.1 libs fallback-mnt-entware@repology
Entware
mipselsf-k3.4
libreadline 8.1 libs fallback-mnt-entware@repology
Entware
mipssf-k3.4
libreadline 8.1 libs fallback-mnt-entware@repology
Exherbo
arbor
sys-libs/readline 8.1_p1 sys-libs fallback-mnt-exherbo@repology
Exherbo
arbor
sys-libs/readline 8.0_p4 sys-libs fallback-mnt-exherbo@repology
Exherbo
arbor
sys-libs/readline 7.0_p5 sys-libs fallback-mnt-exherbo@repology
Exherbo
arbor
sys-libs/readline 6.3_p8 Potentially vulnerable sys-libs fallback-mnt-exherbo@repology
Fedora 26
release
readline 7.0 Unspecified -
Fedora 26
release
compat-readline6 6.3 Potentially vulnerable Unspecified -
Fedora 26
release
mingw-readline 6.2 Potentially vulnerable System Environment/Libraries -
Fedora 26
release
compat-readline5 5.2 Potentially vulnerable System Environment/Libraries -
Fedora 27
release
readline 7.0 Unspecified -
Fedora 27
release
compat-readline6 6.3 Potentially vulnerable Unspecified -
Fedora 27
release
mingw-readline 6.2 Potentially vulnerable System Environment/Libraries -
Fedora 27
release
compat-readline5 5.2 Potentially vulnerable System Environment/Libraries -
Fedora 28
updates
readline 7.0 Unspecified -
Fedora 28
release
readline 7.0 Unspecified -
Fedora 28
release
compat-readline6 6.3 Potentially vulnerable Unspecified -
Fedora 28
release
mingw-readline 6.2 Potentially vulnerable System Environment/Libraries -
Fedora 28
release
compat-readline5 5.2 Potentially vulnerable System Environment/Libraries -
Fedora 29
release
readline 7.0 Unspecified -
Fedora 29
release
compat-readline6 6.3 Potentially vulnerable Unspecified -
Fedora 29
release
mingw-readline 6.2 Potentially vulnerable System Environment/Libraries -
Fedora 29
release
compat-readline5 5.2 Potentially vulnerable System Environment/Libraries -
Fedora 30
release
readline 8.0 Unspecified -
Fedora 30
release
compat-readline6 6.3 Potentially vulnerable Unspecified -
Fedora 30
release
mingw-readline 6.2 Potentially vulnerable Unspecified -
Fedora 30
release
compat-readline5 5.2 Potentially vulnerable Unspecified -
Fedora 31
release
readline 8.0 Unspecified -
Fedora 31
release
compat-readline6 6.3 Potentially vulnerable Unspecified -
Fedora 31
release
mingw-readline 6.2 Potentially vulnerable Unspecified -
Fedora 31
release
compat-readline5 5.2 Potentially vulnerable Unspecified -
Fedora 32
release
readline 8.0 Unspecified -
Fedora 32
release
mingw-readline 8.0 Unspecified -
Fedora 32
release
compat-readline6 6.3 Potentially vulnerable Unspecified -
Fedora 32
release
compat-readline5 5.2 Potentially vulnerable Unspecified -
Fedora 33
release
readline 8.0 Unspecified -
Fedora 33
release
mingw-readline 8.0 Unspecified -
Fedora 33
release
compat-readline6 6.3 Potentially vulnerable Unspecified -
Fedora 33
release
compat-readline5 5.2 Potentially vulnerable Unspecified -
Fedora 34
release
readline 8.1 Unspecified -
Fedora 34
release
mingw-readline 8.1 Unspecified -
Fedora 34
release
compat-readline6 6.3 Potentially vulnerable Unspecified -
Fedora 34
release
compat-readline5 5.2 Potentially vulnerable Unspecified -
Fedora 35
development
readline 8.1 Unspecified -
Fedora 35
development
mingw-readline 8.1 Unspecified -
Fedora 35
development
compat-readline6 6.3 Potentially vulnerable Unspecified -
Fedora 35
development
compat-readline5 5.2 Potentially vulnerable Unspecified -
Fedora Rawhide readline 8.1 Unspecified -
Fedora Rawhide mingw-readline 8.1 Unspecified -
Fedora Rawhide compat-readline6 6.3 Potentially vulnerable Unspecified -
Fedora Rawhide compat-readline5 5.2 Potentially vulnerable Unspecified -
FreeBSD Ports devel/readline 8.1p1 devel sunpoet@freebsd.org
Funtoo 1.4
core-kit
sys-libs/readline 8.0 sys-libs base-system@gentoo.org
Funtoo 1.4
core-kit
sys-libs/readline 7.0_p5 sys-libs base-system@gentoo.org
Funtoo 1.4
core-kit
sys-libs/readline 7.0_p3 sys-libs base-system@gentoo.org
Funtoo 1.4
core-kit
sys-libs/readline 7.0_p3 sys-libs base-system@gentoo.org
Funtoo 1.4
core-kit
sys-libs/readline 6.3_p8 Potentially vulnerable sys-libs base-system@gentoo.org
Funtoo 1.4
core-kit
sys-libs/readline 5.2_p14 Potentially vulnerable sys-libs base-system@gentoo.org
Funtoo 1.4
core-kit
sys-libs/readline 4.3_p5 Potentially vulnerable sys-libs base-system@gentoo.org
Gentoo sys-libs/readline 8.1_p1 sys-libs base-system@gentoo.org
GNU Guix readline 8.0p4 - -
GNU Guix readline 7.0p5 - -
GNU Guix readline 6.2 Potentially vulnerable - -
GoboLinux Readline 8.0 - -
HaikuPorts master sys-libs/readline 8.1 sys-libs -
HaikuPorts master sys-libs/readline 7.0p5 sys-libs -
HaikuPorts master sys-libs/readline 6.3p8 Potentially vulnerable sys-libs -
Homebrew readline 8.1p1 - -
HP-UX 11.31
ia64_64
readline 8.1p001 - -
HP-UX 11.31
hppa_32
readline 8.0p004 - -
HP-UX 11.31
ia64_64
readline 8.0p004 - -
HP-UX 11.31
hppa_32
readline 7.0p003 - -
HP-UX 11.31
ia64_32
readline 7.0p003 - -
HP-UX 11.31
ia64_64
readline 7.0p003 - -
HP-UX 11.31
hppa_32
readline 6.2p005 Potentially vulnerable - -
Hyperbola
core
readline 7.0 - -
IBM i readline 8.1 Unspecified -
IBM i readline 6.3 Potentially vulnerable Unspecified -
Kali Linux Rolling
main
readline 8.1 misc doko@debian.org
KaOS
core
readline 8.1p001 - demm@kaosx.us
LiGurOS stable sys-libs/readline 8.1_p1 sys-libs base-system@gentoo.org
LiGurOS develop sys-libs/readline 8.1_p1 sys-libs base-system@gentoo.org
Linuxbrew readline 8.1p1 - -
MacPorts readline 8.1 devel mcalhoun@macports, marcuscalhoun-lopez@github
MacPorts readline-5 5.2p014 Potentially vulnerable devel kimuraw@macports, kimuraw@github
Mageia 7
core/release
readline 7.0 System/Libraries -
Mageia 7
core/release
mingw-readline 6.2 Potentially vulnerable Development/Other -
Mageia 8
core/release
readline 8.1 System/Libraries -
Mageia 8
core/release
mingw-readline 8.0 Development/Other -
Mageia Cauldron
core/release
readline 8.1 System/Libraries -
Mageia Cauldron
core/release
mingw-readline 8.1 Development/Other -
Manjaro Stable
core
readline 8.1p001 - -
Manjaro Stable
multilib
lib32-readline 8.1p001 - -
Manjaro Staging
multilib
lib32-readline 8.1p001 - -
Manjaro Staging
core
readline 8.1p001 - -
Manjaro Testing
multilib
lib32-readline 8.1p001 - -
Manjaro Testing
core
readline 8.1p001 - -
Manjaro Unstable
core
readline 8.1p001 - -
Manjaro Unstable
multilib
lib32-readline 8.1p001 - -
MidnightBSD mports devel/readline 8.1p1 devel -
MSYS2 mingw
x86_64
mingw-w64-x86_64-readline 8.1p001 - -
MSYS2 mingw
i686
mingw-w64-i686-readline 8.1p001 - -
MSYS2 msys2
x86_64
libreadline-devel 8.1p001 development -
MSYS2 msys2
x86_64
libreadline 8.1p001 libraries -
MSYS2 msys2
i686
libreadline 8.1 libraries -
MSYS2 msys2
i686
libreadline-devel 8.1 development -
MX Linux MX-19 Testing
test
readline 8.1 libs swamprabbit@mxlinux.org
nixpkgs stable 21.05 readline 8.1 - w@wdtz.org
nixpkgs stable 21.05 readline 7.0p5 - fallback-mnt-nix@repology
nixpkgs stable 21.05 readline 6.3p08 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 21.05 readline 6.2 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 21.05 readline 5.2 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable readline 8.1 - w@wdtz.org
nixpkgs unstable readline 7.0p5 - fallback-mnt-nix@repology
nixpkgs unstable readline 6.3p08 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable readline 6.2 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable readline 5.2 Potentially vulnerable - fallback-mnt-nix@repology
OpenBSD Ports devel/readline 7.0 devel ports@openbsd.org
openEuler 20.03
source
readline 7.0 Unspecified -
OpenIndiana packages
hipster
readline 6.3 Potentially vulnerable System/Libraries -
openmamba
devel
libreadline 8.1 System/Libraries silvan.calarco@mambasoft.it
openmamba
devel
libreadline7 7.0p005 System/Libraries silvan.calarco@mambasoft.it
openmamba
devel
libreadline6 6.3p008 Potentially vulnerable System/Libraries silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
readline 8.0 System/Libraries bero@lindev.ch
OpenMandriva Cooker
main/release
readline 8.1 System/Libraries tpgxyz@gmail.com
OpenPKG readline 8.1p1 Terminal -
openSUSE Leap 42.3
main/oss
libreadline5 5.2 Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
main/oss
compat-readline4 4.3 Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
main/oss
readline6 6.3 Potentially vulnerable System/Shells -
openSUSE Leap 15.0
main/oss
libreadline5 5.2 Potentially vulnerable System/Libraries -
openSUSE Leap 15.1
main/oss
readline6 6.3 Potentially vulnerable System/Shells -
openSUSE Leap 15.1
main/oss
libreadline5 5.2 Potentially vulnerable System/Libraries -
openSUSE Leap 15.2
main/oss
readline6 6.3 Potentially vulnerable System/Shells -
openSUSE Leap 15.2
main/oss
libreadline5 5.2 Potentially vulnerable System/Libraries -
openSUSE Leap 15.3
main/oss
readline6 6.3 Potentially vulnerable System/Shells -
openSUSE Leap 15.3
main/oss
libreadline5 5.2 Potentially vulnerable System/Libraries -
openSUSE Tumbleweed
src-oss
readline 8.1 Development/Libraries/C and C++ -
openSUSE Tumbleweed
src-oss
readline6 6.3 Potentially vulnerable System/Shells -
openSUSE Tumbleweed
src-oss
libreadline5 5.2 Potentially vulnerable System/Libraries -
OpenWrt 17.01 x86_64
base
libreadline 7.0 libs fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
libreadline 7.0 libs fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
libreadline8 8.0 libs fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
base
libreadline8 8.1 libs fallback-mnt-openwrt@repology
OS4Depot libreadline 5.2 Potentially vulnerable development/library/misc -
Parabola
core
readline 8.1p001 - -
Pardus 17
main
readline 7.0 misc doko@debian.org
Pardus 17
main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Pardus 19
main
readline 7.0 misc doko@debian.org
Pardus 19
main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Pardus 21
main
readline 8.1 misc doko@debian.org
Parrot
main
readline 8.1 misc doko@debian.org
PCLinuxOS readline 8.1 System/Libraries -
PCLinuxOS readline 7.0 System/Libraries -
Pisi Linux
core
readline 8.0p4 library admins@pisilinux.org
pkgsrc current devel/readline 8.1 devel pkgsrc-users@netbsd.org
PLD Linux readline 8.1p1 - -
PureOS Amber readline 7.0 misc doko@debian.org
PureOS Amber readline5 5.2 Potentially vulnerable misc packages@qa.debian.org
PureOS landing readline 8.1 misc doko@debian.org
PureOS landing readline5 5.2 Potentially vulnerable misc packages@qa.debian.org
Raspbian Oldstable
main
readline 7.0 misc doko@debian.org
Raspbian Oldstable
main
readline6 6.3 Potentially vulnerable libs doko@debian.org
Raspbian Oldstable
main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Raspbian Stable
main
readline 8.1 misc doko@debian.org
Raspbian Stable
main
readline6 6.3 Potentially vulnerable libs doko@debian.org
Raspbian Stable
main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Raspbian Testing
main
readline 8.1 misc doko@debian.org
Raspbian Testing
main
readline6 6.3 Potentially vulnerable libs doko@debian.org
Raspbian Testing
main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Ravenports readline 8.1p1 devel fallback-mnt-ravenports@repology
Rocky Linux 8
BaseOS
readline 7.0 Unspecified infrastructure@rockylinux.org
Rocky Linux 8
PowerTools
mingw-readline 6.2 Potentially vulnerable System Environment/Libraries infrastructure@rockylinux.org
Rosa 2014.1
main/release
readline 6.3 Potentially vulnerable - -
Rosa 2016.1
main/release
readline 7.0 - -
Rosa 2016.1
main/release
readline6 6.3 Potentially vulnerable - -
Rosa 2019.1
main/release
readline 8.0 System/Libraries m.novosyolov@rosalinux.ru
Rosa 2019.1
main/release
readline6 6.3 Potentially vulnerable System/Libraries m.novosyolov@rosalinux.ru
Rosa Server 6.9
base/release
readline 6.0 Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
compat-readline5 5.2 Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
mingw32-readline 5.2 Potentially vulnerable System Environment/Libraries andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
readline 6.2 Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Rosa Server 7.5
base/release
readline 6.2 Potentially vulnerable System Environment/Libraries alex2048@mail.ru
Rosa Server 7.5
base/release
readline 6.2 Potentially vulnerable System Environment/Libraries alex2048@mail.ru
SageMath stable readline 8.0 - -
SageMath development readline 8.0 - -
Scientific Linux 7.x readline 6.2 Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x readline 6.2 Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x readline 6.2 Potentially vulnerable System Environment/Libraries -
Scientific Linux 7.x readline 6.2 Potentially vulnerable System Environment/Libraries -
Slackware 14.2
slackware
readline 6.3 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
readline 8.1p001 - volkerdi@slackware.com
Slackware64 14.2
slackware64
readline 6.3 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
readline 8.1p001 - volkerdi@slackware.com
Slackwarearm 14.2
slackware
readline 6.3 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm current
slackware
readline 8.1.001.001 - volkerdi@slackware.com
SliTaz Cooking readline 8.0 system-tools pankso@slitaz.org
SliTaz Cooking readline-dev 8.0 development pankso@slitaz.org
SliTaz Next readline 7.0 system-tools devel@slitaz.org
SliTaz Next readline-dev 7.0 development devel@slitaz.org
Solus readline-32bit 6.3p008 Potentially vulnerable emul32 joshua@streambits.io
Solus readline-32bit-dbginfo 6.3p008 Potentially vulnerable debug joshua@streambits.io
Solus readline-32bit-devel 6.3p008 Potentially vulnerable programming.devel joshua@streambits.io
Solus readline 6.3p008 Potentially vulnerable system.base joshua@streambits.io
Solus readline-dbginfo 6.3p008 Potentially vulnerable debug joshua@streambits.io
Solus readline-devel 6.3p008 Potentially vulnerable system.devel joshua@streambits.io
Spack readline 8.1 - fallback-mnt-spack@repology
T2 SDE readline 8.1p001 base/library rene@t2-project.org
Termux readline 8.1p1 - termux@termux
Trisquel 6.0
toutatis/main
readline6 6.2 Potentially vulnerable libs doko@debian.org
Trisquel 6.0
toutatis/main
readline5 5.2 Potentially vulnerable libs doko@debian.org
Trisquel 7.0
belenos/main
readline6 6.3 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos/main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Trisquel 8.0
flidas/main
readline6 6.3 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas/main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Trisquel 9.0
etiona/main
readline 7.0 libs doko@debian.org
Trisquel 9.0
etiona/main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
UBI 8
baseos
readline 7.0 Unspecified -
Ubuntu 14.04
trusty/main
readline6 6.3 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty/main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Ubuntu 16.04
xenial/main
readline6 6.3 Potentially vulnerable libs ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial/main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Ubuntu 18.04
bionic/main
readline 7.0 libs doko@debian.org
Ubuntu 18.04
bionic/main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Ubuntu 20.04
focal/main
readline 8.0 libs doko@debian.org
Ubuntu 20.04
focal/main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Ubuntu 20.10
groovy/main
readline 8.0 libs doko@debian.org
Ubuntu 20.10
groovy/main
readline5 5.2 Potentially vulnerable libs packages@qa.debian.org
Ubuntu 21.04
hirsute/main
readline 8.1 libs doko@debian.org
Ubuntu 21.10
impish/main
readline 8.1 libs doko@debian.org
Vcpkg readline 0 Potentially vulnerable - -
Void Linux x86_64
x86_64
libhistory8 8.1 - orphan@voidlinux.org
Void Linux x86_64
x86_64
libreadline8 8.1 - orphan@voidlinux.org
Void Linux x86_64
x86_64
readline-devel 8.1 - orphan@voidlinux.org
Void Linux x86_64
x86_64
readline 8.0 - thinkabit.ukim@gmail.com
Wikidata GNU Readline 8.1 - -