Versions Packages Information History CVEs Related Badges Report

Versions for xen

259 package(s) known

Repository Package name Version Category Maintainer(s)
Alpine Linux 3.8
main
xen-libs 4.10.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.8
main
xen-dev 4.10.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.8
main
xen 4.10.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.8
main
xen-bridge 4.10.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.8
main
xen-doc 4.10.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.8
main
xen-hypervisor 4.10.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.9
main
xen-dev 4.11.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.9
main
xen-hypervisor 4.11.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.9
main
xen 4.11.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.9
main
xen-bridge 4.11.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.9
main
xen-doc 4.11.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.9
main
xen-libs 4.11.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.10
main
xen-hypervisor 4.12.4 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.10
main
xen-libs 4.12.4 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.10
main
xen-doc 4.12.4 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.10
main
xen-dev 4.12.4 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.10
main
xen 4.12.4 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.10
main
xen-bridge 4.12.4 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
xen 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
xen-hypervisor 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
xen-libs 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
xen-bridge 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
xen-doc 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
xen-dev 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
xen-bridge 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
xen-hypervisor 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
xen-doc 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
xen-dev 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
xen 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
xen-libs 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
xen-dev 4.14.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
xen-hypervisor 4.14.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
xen-doc 4.14.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
xen-bridge 4.14.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
xen 4.14.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
xen-libs 4.14.5 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
xen-libs 4.15.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
xen-doc 4.15.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
xen-dev 4.15.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
xen-bridge 4.15.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
xen 4.15.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
xen-hypervisor 4.15.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
xen-dev 4.15.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
xen-hypervisor 4.15.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
xen 4.15.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
xen-doc 4.15.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
xen-bridge 4.15.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
xen-libs 4.15.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
xen-dev 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
xen-libs 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
xen-hypervisor 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
xen-qemu 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
xen-bridge 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
xen-doc 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
xen 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
xen-bridge 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
xen-bash-completion 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
xen-dev 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
xen 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
xen-hypervisor 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
xen-libs 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
xen-qemu 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
main
xen-doc 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
xen-hypervisor 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
xen-bridge 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
xen-dev 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
xen-libs 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
xen-doc 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
xen-qemu 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
xen 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
main
xen-bash-completion 4.16.2 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 xen 4.10.3 Potentially vulnerable Emulators shadrinov@altlinux.org
ALT Linux p10 xen 4.14.1 Potentially vulnerable Emulators rider@altlinux.org
AUR xen 4.16.3pre Potentially vulnerable - refutationalist@aur
AUR xen-docs 4.16.3pre Potentially vulnerable - refutationalist@aur
AUR xen-stubdom 4.16.3pre Potentially vulnerable - refutationalist@aur
Astra Orel Stable
main
xen 4.8.5.final+shim4.10.4 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Debian 8
jessie/updates/main
xen 4.4.4lts5 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ultrotter@debian.org, waldi@debian.org
Debian 8
jessie/main
xen 4.4.1 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ultrotter@debian.org, waldi@debian.org
Debian 9
stretch/main
xen 4.8.5.final+shim4.10.4 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Debian 9
stretch/updates/main
xen 4.8.5.final+shim4.10.4 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Debian 10
buster/main
xen 4.11.4+107-gef32c7afa2 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Debian 10
buster/updates/main
xen 4.11.4+107-gef32c7afa2 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Debian 11
bullseye-security/main
xen 4.14.5+86-g1c354767d5 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Debian 11
bullseye/main
xen 4.14.5+24-g87d90d511c Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Debian 12
bookworm/main
xen 4.16.2+90-g0d39a6d1ae Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, iwj@xenproject.org
Debian Unstable
sid/main
xen 4.16.2+90-g0d39a6d1ae Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, iwj@xenproject.org
Deepin
main
xen 4.11.4+57.2 Potentially vulnerable - pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Devuan 1.0
jessie/main
xen 4.4.1 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ultrotter@debian.org, waldi@debian.org
Devuan 2.0
ascii/main
xen 4.8.5.final+shim4.10.4 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Devuan 3.0
beowulf/main
xen 4.11.4+107-gef32c7afa2 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Devuan 4.0
chimaera/main
xen 4.14.5+24-g87d90d511c Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Devuan Unstable
unstable/main
xen 4.16.2+90-g0d39a6d1ae Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, iwj@xenproject.org
Fedora 26
updates
xen 4.8.3 Potentially vulnerable Development/Libraries -
Fedora 26
release
xen 4.8.1 Potentially vulnerable Development/Libraries -
Fedora 27
updates
xen 4.9.3 Potentially vulnerable Development/Libraries -
Fedora 27
release
xen 4.9.0 Potentially vulnerable Development/Libraries -
Fedora 28
updates
xen 4.10.3 Potentially vulnerable Development/Libraries -
Fedora 28
release
xen 4.10.0 Potentially vulnerable Development/Libraries -
Fedora 29
updates
xen 4.11.2 Potentially vulnerable Unspecified -
Fedora 29
release
xen 4.11.0 Potentially vulnerable Development/Libraries -
Fedora 30
updates
xen 4.11.4 Potentially vulnerable Unspecified -
Fedora 30
release
xen 4.11.1 Potentially vulnerable Unspecified -
Fedora 31
updates
xen 4.12.3 Potentially vulnerable Unspecified -
Fedora 31
release
xen 4.12.1 Potentially vulnerable Unspecified -
Fedora 32
updates
xen 4.13.3 Potentially vulnerable Unspecified -
Fedora 32
release
xen 4.13.0 Potentially vulnerable Unspecified -
Fedora 33
updates
xen 4.14.3 Potentially vulnerable Unspecified -
Fedora 33
release
xen 4.14.0 Potentially vulnerable Unspecified -
Fedora 34
updates
xen 4.14.5 Potentially vulnerable Unspecified -
Fedora 34
release
xen 4.14.1 Potentially vulnerable Unspecified -
Fedora 35
updates
xen 4.15.4 Potentially vulnerable Unspecified -
Fedora 35
release
xen 4.15.1 Potentially vulnerable Unspecified -
Fedora 36
updates
xen 4.16.2 Potentially vulnerable Unspecified -
Fedora 36
release
xen 4.16.0 Potentially vulnerable Unspecified -
Fedora 37
release
xen 4.16.2 Potentially vulnerable Unspecified -
Fedora 37
updates
xen 4.16.2 Potentially vulnerable Unspecified -
Fedora Rawhide
development
xen 4.16.2 Potentially vulnerable Unspecified -
Funtoo 1.4
nokit
app-emulation/xen 4.12.0 Potentially vulnerable app-emulation xen@gentoo.org
Funtoo 1.4
nokit
app-emulation/xen 4.11.1 Potentially vulnerable app-emulation xen@gentoo.org
Funtoo 1.4
nokit
app-emulation/xen 4.10.3 Potentially vulnerable app-emulation xen@gentoo.org
Gentoo app-emulation/xen 4.16.3_pre1 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
Gentoo app-emulation/xen 4.16.3_pre Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
Gentoo app-emulation/xen 4.15.4 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
Gentoo app-emulation/xen 4.15.4_pre2 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
Gentoo app-emulation/xen 4.15.4_pre1 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
GNU Guix xen 4.14.1 Potentially vulnerable - -
Kali Linux Rolling
main
xen 4.16.2+90-g0d39a6d1ae Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, iwj@xenproject.org
LiGurOS stable app-emulation/xen 4.16.3_pre Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
LiGurOS stable app-emulation/xen 4.15.4_pre1 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
LiGurOS develop app-emulation/xen 4.16.3_pre1 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
LiGurOS develop app-emulation/xen 4.16.3_pre Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
LiGurOS develop app-emulation/xen 4.15.4 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
LiGurOS develop app-emulation/xen 4.15.4_pre2 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
LiGurOS develop app-emulation/xen 4.15.4_pre1 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
Mageia 7
core/updates
xen 4.12.1 Potentially vulnerable System/Kernel and hardware -
Mageia 7
core/release
xen 4.12.0 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/release
xen 4.14.1 Potentially vulnerable System/Kernel and hardware -
Mageia Cauldron
core/release
xen 4.16.2 Potentially vulnerable System/Kernel and hardware -
nixpkgs stable 21.11 xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, 4zktub6tep74pyjopwir013s2av29yubw5f9zh2f4d5umjuj6s@hash.domains, oxij@oxij.org
nixpkgs stable 21.11 xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, 4zktub6tep74pyjopwir013s2av29yubw5f9zh2f4d5umjuj6s@hash.domains, oxij@oxij.org
nixpkgs stable 21.11 xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, 4zktub6tep74pyjopwir013s2av29yubw5f9zh2f4d5umjuj6s@hash.domains, oxij@oxij.org
nixpkgs stable 22.05 xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, 4zktub6tep74pyjopwir013s2av29yubw5f9zh2f4d5umjuj6s@hash.domains, oxij@oxij.org
nixpkgs stable 22.05 xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, 4zktub6tep74pyjopwir013s2av29yubw5f9zh2f4d5umjuj6s@hash.domains, oxij@oxij.org
nixpkgs stable 22.05 xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, 4zktub6tep74pyjopwir013s2av29yubw5f9zh2f4d5umjuj6s@hash.domains, oxij@oxij.org
nixpkgs stable 22.11 xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, oxij@oxij.org
nixpkgs stable 22.11 xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, oxij@oxij.org
nixpkgs stable 22.11 xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, oxij@oxij.org
nixpkgs unstable xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, oxij@oxij.org
nixpkgs unstable xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, oxij@oxij.org
nixpkgs unstable xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, oxij@oxij.org
openmamba
devel
xen 4.16.2 Potentially vulnerable Applications/Emulators silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
xen 4.5.1 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 4.1
main/release
xen 4.5.1 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 4.2
main/release
xen 4.5.1 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva 4.3
main/release
xen 4.5.1 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva Rolling
main/release
xen 4.5.1 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva Cooker
main/release
xen 4.5.1 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
openSUSE Leap 42.3
updates/oss
xen 4.9.4_04 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.4_02 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.3_03 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.3_03 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.2_10 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.2_08 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.2_06 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.2_04 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.1_08 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.1_02 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.0_14 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.0_12 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.0_11 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
main/oss
xen 4.9.0_08 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.4_06 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.4_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.3_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.3_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.2_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.1_08 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.1_06 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.1_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
main/oss
xen 4.10.0_20 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.4_06 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.4_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.4_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.3_10 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.3_06 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.3_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.3_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.2_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.2_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.1_06 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.1_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.1_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
main/oss
xen 4.12.0_10 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.4_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.3_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.3_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.2_08 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.2_06 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.2_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.2_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.1_10 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.1_08 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.1_06 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.1_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
main/oss
xen 4.13.1_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.3
main/oss
xen 4.14.1_16 Potentially vulnerable System/Kernel -
openSUSE Leap 15.4
main/oss
xen 4.16.0_08 Potentially vulnerable System/Kernel -
openSUSE Leap 15.5
main/oss
xen 4.16.2_08 Potentially vulnerable System/Kernel -
openSUSE Tumbleweed
src-oss
xen 4.16.2_04 Potentially vulnerable System/Kernel -
Parabola
pcr
xen 4.16.0 Potentially vulnerable - -
Parabola
pcr
xen-docs 4.16.0 Potentially vulnerable - -
Parabola
pcr
xen-qemu-builtin 4.16.0 Potentially vulnerable - -
Pardus 17
main
xen 4.8.5+shim4.10.2+xsa282 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Pardus 17
updates/main
xen 4.8.5+shim4.10.2+xsa282 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Pardus 17
updates/main
xen 4.8.4+xsa273+shim4.10.1+xsa273 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Pardus 17
updates/main
xen 4.8.3+xsa267+shim4.10.1+xsa267 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Pardus 19
main
xen 4.11.4+107-gef32c7afa2 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Pardus 19
updates/main
xen 4.11.4+107-gef32c7afa2 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Pardus 21
updates/main
xen 4.14.5+86-g1c354767d5 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Pardus 21
main
xen 4.14.5+24-g87d90d511c Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Parrot
parrot-updates/main
xen 4.14.5+86-g1c354767d5 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Parrot
parrot/main
xen 4.14.5+86-g1c354767d5 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
PLD Linux xen 4.16.1 Potentially vulnerable - -
PureOS Amber xen 4.11.4+107-gef32c7afa2 Potentially vulnerable misc pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
PureOS landing xen 4.14.5+24-g87d90d511c Potentially vulnerable misc pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
PureOS landing xen 4.14.2+25-gb6a8c4f72d Potentially vulnerable misc pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Raspbian Oldstable
main
xen 4.11.4+107-gef32c7afa2 Potentially vulnerable admin pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Raspbian Stable
main
xen 4.14.5+86-g1c354767d5 Potentially vulnerable admin pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Raspbian Testing
main
xen 4.16.2+90-g0d39a6d1ae Potentially vulnerable admin pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, iwj@xenproject.org
Rosa 2014.1
main/release
xen 4.3.1 Potentially vulnerable - -
Rosa 2014.1
main/updates
xen 4.3.1 Potentially vulnerable - -
Rosa 2016.1
main/release
xen 4.3.1 Potentially vulnerable - -
SlackBuilds system/xen 4.16.2 Potentially vulnerable system -
Trisquel 6.0
toutatis-updates/main
xen 4.1.6.1 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Trisquel 6.0
toutatis/main
xen 4.1.2 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Trisquel 7.0
belenos-updates/main
xen 4.4.2 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Trisquel 7.0
belenos/main
xen 4.4.0 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Trisquel 8.0
flidas-updates/main
xen 4.6.5 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Trisquel 8.0
flidas/main
xen 4.6.0 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Trisquel 9.0
etiona/main
xen 4.9.2 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Trisquel 10.0
nabia/main
xen 4.11.3+24-g14b62ab3e5 Potentially vulnerable universe/kernel ubuntu-devel-discuss@lists.ubuntu.com, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Trisquel 10.0
nabia-updates/main
xen 4.11.3+24-g14b62ab3e5 Potentially vulnerable universe/kernel ubuntu-devel-discuss@lists.ubuntu.com, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 14.04
trusty-updates/main
xen 4.4.2 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 14.04
trusty/main
xen 4.4.0 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 16.04
xenial-updates/main
xen 4.6.5 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 16.04
xenial/main
xen 4.6.0 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 18.04
bionic/main
xen 4.9.2 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 20.04
focal-updates/universe
xen 4.11.3+24-g14b62ab3e5 Potentially vulnerable universe/kernel ubuntu-devel-discuss@lists.ubuntu.com, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 20.04
focal/universe
xen 4.11.3+24-g14b62ab3e5 Potentially vulnerable universe/kernel ubuntu-devel-discuss@lists.ubuntu.com, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 22.04
jammy/universe
xen 4.16.0 Potentially vulnerable universe/kernel ubuntu-devel-discuss@lists.ubuntu.com, hans@knorrie.org, iwj@xenproject.org
Ubuntu 22.10
kinetic/universe
xen 4.16.2 Potentially vulnerable universe/kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, iwj@xenproject.org
Ubuntu 22.10 Proposed
kinetic-proposed/universe
xen 4.16.2 Potentially vulnerable universe/kernel ubuntu-devel-discuss@lists.ubuntu.com, hans@knorrie.org, iwj@xenproject.org
Void Linux x86_64
x86_64
xen 4.14.1 Potentially vulnerable - chris@the-brannons.com
Void Linux x86_64
x86_64
xen-devel 4.14.1 Potentially vulnerable - chris@the-brannons.com
Void Linux x86_64
x86_64
xen-doc 4.14.1 Potentially vulnerable - chris@the-brannons.com
Void Linux x86_64
x86_64
xen-hypervisor 4.14.1 Potentially vulnerable - chris@the-brannons.com
Void Linux x86_64
x86_64
xen-libs 4.14.1 Potentially vulnerable - chris@the-brannons.com
Wikidata Xen 4.16.1 Potentially vulnerable - -