Versions Packages Information History CVEs Related Badges Report

Versions for xen

214 package(s) known

Repository Package name Version Category Maintainer(s)
Alpine Linux 3.8
main
xen-libs 4.10.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.8
main
xen-dev 4.10.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.8
main
xen 4.10.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.8
main
xen-bridge 4.10.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.8
main
xen-doc 4.10.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.8
main
xen-hypervisor 4.10.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.9
main
xen-hypervisor 4.11.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.9
main
xen 4.11.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.9
main
xen-dev 4.11.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.9
main
xen-bridge 4.11.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.9
main
xen-doc 4.11.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.9
main
xen-libs 4.11.4 Potentially vulnerable - nenolod@dereferenced.org
Alpine Linux 3.10
main
xen-hypervisor 4.12.4 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.10
main
xen-libs 4.12.4 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.10
main
xen-doc 4.12.4 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.10
main
xen-dev 4.12.4 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.10
main
xen 4.12.4 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.10
main
xen-bridge 4.12.4 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.11
main
xen-doc 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
xen 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
xen-hypervisor 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
xen-libs 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
xen-bridge 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
xen-dev 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
xen 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
xen-libs 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
xen-bridge 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
xen-hypervisor 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
xen-dev 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
xen-doc 4.13.4 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
xen-bridge 4.14.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
xen-libs 4.14.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
xen 4.14.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
xen-dev 4.14.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
xen-doc 4.14.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
xen-hypervisor 4.14.3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
xen-hypervisor 4.15.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
xen-dev 4.15.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
xen-libs 4.15.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
xen-doc 4.15.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
xen 4.15.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
xen-bridge 4.15.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
xen-libs 4.15.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
xen-doc 4.15.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
xen-dev 4.15.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
xen 4.15.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
xen-bridge 4.15.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
xen-hypervisor 4.15.1 - ncopa@alpinelinux.org
ALT Linux p9 xen 4.10.3 Potentially vulnerable Emulators shadrinov@altlinux.org
ALT Linux p10 xen 4.14.1 Potentially vulnerable Emulators rider@altlinux.org
ALT Sisyphus xen 4.14.1 Potentially vulnerable Emulators rider@altlinux.org
AUR xen 4.15.0 Potentially vulnerable - refutationalist@aur
AUR xen-docs 4.15.0 Potentially vulnerable - refutationalist@aur
Astra Orel Stable
main
xen 4.8.5.final Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Astra Orel Current
main
xen 4.8.5.final Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Chaotic-AUR xen-docs 4.15.0 Potentially vulnerable - -
Chaotic-AUR xen 4.15.0 Potentially vulnerable - -
Debian 8
jessie/main
xen 4.4.1 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ultrotter@debian.org, waldi@debian.org
Debian 9
stretch/main
xen 4.8.5.final Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Debian 10
buster/main
xen 4.11.4 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Debian 11
bullseye/main
xen 4.14.2 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Debian 12
bookworm/main
xen 4.14.3 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Debian Stable
stable/main
xen 4.14.2 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Debian Testing
testing/main
xen 4.14.3 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Debian Unstable
sid/main
xen 4.14.3 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Deepin
main
xen 4.11.4 Potentially vulnerable - pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Devuan 1.0 (Jessie)
jessie/main
xen 4.4.1 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ultrotter@debian.org, waldi@debian.org
Devuan 2.0 (ASCII)
ascii/main
xen 4.8.5.final Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
xen 4.11.4 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
xen 4.14.2 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Devuan Unstable
unstable/main
xen 4.14.3 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Fedora 26
updates
xen 4.8.3 Potentially vulnerable Development/Libraries -
Fedora 26
release
xen 4.8.1 Potentially vulnerable Development/Libraries -
Fedora 27
updates
xen 4.9.3 Potentially vulnerable Development/Libraries -
Fedora 27
release
xen 4.9.0 Potentially vulnerable Development/Libraries -
Fedora 28
updates
xen 4.10.3 Potentially vulnerable Development/Libraries -
Fedora 28
release
xen 4.10.0 Potentially vulnerable Development/Libraries -
Fedora 29
updates
xen 4.11.2 Potentially vulnerable Unspecified -
Fedora 29
release
xen 4.11.0 Potentially vulnerable Development/Libraries -
Fedora 30
updates
xen 4.11.4 Potentially vulnerable Unspecified -
Fedora 30
release
xen 4.11.1 Potentially vulnerable Unspecified -
Fedora 31
updates
xen 4.12.3 Potentially vulnerable Unspecified -
Fedora 31
release
xen 4.12.1 Potentially vulnerable Unspecified -
Fedora 32
updates
xen 4.13.3 Potentially vulnerable Unspecified -
Fedora 32
release
xen 4.13.0 Potentially vulnerable Unspecified -
Fedora 33
updates
xen 4.14.2 Potentially vulnerable Unspecified -
Fedora 33
release
xen 4.14.0 Potentially vulnerable Unspecified -
Fedora 34
updates
xen 4.14.2 Potentially vulnerable Unspecified -
Fedora 34
release
xen 4.14.1 Potentially vulnerable Unspecified -
Fedora Rawhide xen 4.15.1 Unspecified -
Funtoo 1.4
nokit
app-emulation/xen 4.12.0 Potentially vulnerable app-emulation xen@gentoo.org
Funtoo 1.4
nokit
app-emulation/xen 4.11.1 Potentially vulnerable app-emulation xen@gentoo.org
Funtoo 1.4
nokit
app-emulation/xen 4.10.3 Potentially vulnerable app-emulation xen@gentoo.org
Gentoo app-emulation/xen 4.15.1 app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
Gentoo app-emulation/xen 4.15.0 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
Gentoo app-emulation/xen 4.14.3 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
Gentoo app-emulation/xen 4.14.2 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
GNU Guix xen 4.14.1 Potentially vulnerable - -
Hyperbola
community
xen-docs 4.8.4 Potentially vulnerable - -
Hyperbola
community
xen 4.8.4 Potentially vulnerable - -
Kali Linux Rolling
main
xen 4.14.2 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
LiGurOS stable app-emulation/xen 4.15.0 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
LiGurOS stable app-emulation/xen 4.14.2 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
LiGurOS develop app-emulation/xen 4.15.1 app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
LiGurOS develop app-emulation/xen 4.15.0 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
LiGurOS develop app-emulation/xen 4.14.3 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
LiGurOS develop app-emulation/xen 4.14.2 Potentially vulnerable app-emulation hydrapolic@gmail.com, proxy-maint@gentoo.org, xen@gentoo.org
Mageia 7
core/updates
xen 4.12.1 Potentially vulnerable System/Kernel and hardware -
Mageia 7
core/release
xen 4.12.0 Potentially vulnerable System/Kernel and hardware -
Mageia 8
core/release
xen 4.14.1 Potentially vulnerable System/Kernel and hardware -
Mageia Cauldron
core/release
xen 4.15.0 Potentially vulnerable System/Kernel and hardware -
MX Linux MX-16
main
xen 4.4.1 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ultrotter@debian.org, waldi@debian.org
nixpkgs stable 21.05 xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, 4zktub6tep74pyjopwir013s2av29yubw5f9zh2f4d5umjuj6s@hash.domains, oxij@oxij.org
nixpkgs stable 21.05 xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, 4zktub6tep74pyjopwir013s2av29yubw5f9zh2f4d5umjuj6s@hash.domains, oxij@oxij.org
nixpkgs stable 21.05 xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, 4zktub6tep74pyjopwir013s2av29yubw5f9zh2f4d5umjuj6s@hash.domains, oxij@oxij.org
nixpkgs unstable xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, 4zktub6tep74pyjopwir013s2av29yubw5f9zh2f4d5umjuj6s@hash.domains, oxij@oxij.org
nixpkgs unstable xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, 4zktub6tep74pyjopwir013s2av29yubw5f9zh2f4d5umjuj6s@hash.domains, oxij@oxij.org
nixpkgs unstable xen 4.10.4 Potentially vulnerable - edolstra+nixpkgs@gmail.com, 4zktub6tep74pyjopwir013s2av29yubw5f9zh2f4d5umjuj6s@hash.domains, oxij@oxij.org
openmamba
devel
xen 4.8.0 Potentially vulnerable Applications/Emulators silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
xen 4.5.1 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
OpenMandriva Cooker
main/release
xen 4.5.1 Potentially vulnerable System/Kernel and hardware bero@lindev.ch
openSUSE Leap 42.3
updates/oss
xen 4.9.4_04 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.4_02 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.3_03 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.3_03 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.2_10 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.2_08 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.2_06 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.2_04 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.1_08 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.1_02 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.0_14 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.0_12 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
updates/oss
xen 4.9.0_11 Potentially vulnerable System/Kernel -
openSUSE Leap 42.3
main/oss
xen 4.9.0_08 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.4_06 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.4_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.3_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.3_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.2_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.1_08 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.1_06 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
updates/oss
xen 4.10.1_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.0
main/oss
xen 4.10.0_20 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.4_06 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.4_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.4_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.3_10 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.3_06 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.3_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.3_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.2_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.2_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.1_06 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.1_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
updates/oss
xen 4.12.1_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.1
main/oss
xen 4.12.0_10 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.3_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.3_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.2_08 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.2_06 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.2_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.2_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.1_10 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.1_08 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.1_06 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
updates/oss
xen 4.13.1_04 Potentially vulnerable System/Kernel -
openSUSE Leap 15.2
main/oss
xen 4.13.1_02 Potentially vulnerable System/Kernel -
openSUSE Leap 15.3
main/oss
xen 4.14.1_16 Potentially vulnerable System/Kernel -
openSUSE Tumbleweed
src-oss
xen 4.15.1_01 System/Kernel -
Parabola
pcr
xen 4.10.0 Potentially vulnerable - -
Parabola
pcr
xen-syms 4.9.0 Potentially vulnerable - -
Parabola
pcr
xen-docs 4.9.0 Potentially vulnerable - -
Pardus 17
main
xen 4.8.5 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Pardus 17
updates/main
xen 4.8.5 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Pardus 17
updates/main
xen 4.8.4 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Pardus 17
updates/main
xen 4.8.3 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Pardus 19
main
xen 4.11.4 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Pardus 19
updates/main
xen 4.11.4 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Pardus 21
main
xen 4.14.2 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Parrot
main
xen 4.14.3 Potentially vulnerable kernel pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
PLD Linux xen 4.13.1 Potentially vulnerable - -
PureOS Amber xen 4.11.4 Potentially vulnerable misc pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
PureOS Amber xen 4.11.4 Potentially vulnerable misc pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
PureOS landing xen 4.14.2 Potentially vulnerable misc pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Raspbian Oldstable
main
xen 4.11.4 Potentially vulnerable admin pkg-xen-devel@lists.alioth.debian.org, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Raspbian Stable
main
xen 4.14.3 Potentially vulnerable admin pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Raspbian Testing
main
xen 4.14.3 Potentially vulnerable admin pkg-xen-devel@lists.alioth.debian.org, hans@knorrie.org, ian.jackson@eu.citrix.com
Rosa 2014.1
main/release
xen 4.3.1 Potentially vulnerable - -
Rosa 2014.1
main/updates
xen 4.3.1 Potentially vulnerable - -
Rosa 2016.1
main/release
xen 4.3.1 Potentially vulnerable - -
SlackBuilds system/xen 4.15.0 Potentially vulnerable system -
Trisquel 6.0
toutatis-updates/main
xen 4.1.6.1 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Trisquel 6.0
toutatis/main
xen 4.1.2 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Trisquel 7.0
belenos-updates/main
xen 4.4.2 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Trisquel 7.0
belenos/main
xen 4.4.0 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Trisquel 8.0
flidas-updates/main
xen 4.6.5 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Trisquel 8.0
flidas/main
xen 4.6.0 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Trisquel 9.0
etiona/main
xen 4.9.2 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 14.04
trusty-updates/main
xen 4.4.2 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 14.04
trusty/main
xen 4.4.0 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 16.04
xenial-updates/main
xen 4.6.5 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 16.04
xenial/main
xen 4.6.0 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 18.04
bionic/main
xen 4.9.2 Potentially vulnerable kernel ubuntu-devel-discuss@lists.ubuntu.com, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 20.04
focal/universe
xen 4.11.3 Potentially vulnerable universe/kernel ubuntu-devel-discuss@lists.ubuntu.com, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 20.10
groovy/universe
xen 4.11.4 Potentially vulnerable universe/kernel ubuntu-devel-discuss@lists.ubuntu.com, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 21.04
hirsute/universe
xen 4.11.4 Potentially vulnerable universe/kernel ubuntu-devel-discuss@lists.ubuntu.com, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Ubuntu 21.10
impish/universe
xen 4.11.4 Potentially vulnerable universe/kernel ubuntu-devel-discuss@lists.ubuntu.com, ian.jackson@eu.citrix.com, ultrotter@debian.org, waldi@debian.org
Void Linux x86_64
x86_64
xen 4.14.1 Potentially vulnerable - chris@the-brannons.com
Void Linux x86_64
x86_64
xen-devel 4.14.1 Potentially vulnerable - chris@the-brannons.com
Void Linux x86_64
x86_64
xen-doc 4.14.1 Potentially vulnerable - chris@the-brannons.com
Void Linux x86_64
x86_64
xen-hypervisor 4.14.1 Potentially vulnerable - chris@the-brannons.com
Void Linux x86_64
x86_64
xen-libs 4.14.1 Potentially vulnerable - chris@the-brannons.com
Wikidata Xen 4.15.0 Potentially vulnerable - -