Versions Packages Information History CVEs Related Badges Report

Versions for zstd

254 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
system
zstd 1.4.5 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
system
zstd-dev 1.4.5 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
system
zstd-doc 1.4.5 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
system
zstd-dbg 1.4.5 Potentially vulnerable - awilfox@adelielinux.org
AlmaLinux 8
BaseOS
zstd 1.4.4 Potentially vulnerable Unspecified packager@cloudlinux.com
Alpine Linux 3.8
community
zstd-doc 1.3.4 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.8
community
zstd-static 1.3.4 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.8
community
zstd-dev 1.3.4 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.8
community
zstd 1.3.4 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.8
community
zstd-libs 1.3.4 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.9
main
zstd-libs 1.3.8 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.9
main
zstd 1.3.8 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.9
main
zstd-static 1.3.8 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.9
main
zstd-doc 1.3.8 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.9
main
zstd-dev 1.3.8 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.10
main
zstd-static 1.4.0 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.10
main
zstd-libs 1.4.0 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.10
main
zstd-dev 1.4.0 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.10
main
zstd 1.4.0 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.10
main
zstd-doc 1.4.0 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.11
main
zstd-static 1.4.4 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.11
main
zstd-doc 1.4.4 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.11
main
zstd 1.4.4 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.11
main
zstd-dev 1.4.4 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.11
main
zstd-libs 1.4.4 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.12
main
zstd-libs 1.4.5 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.12
main
zstd 1.4.5 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.12
main
zstd-dev 1.4.5 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.12
main
zstd-doc 1.4.5 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.12
main
zstd-static 1.4.5 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.13
main
zstd-static 1.4.5 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.13
main
zstd 1.4.5 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.13
main
pzstd 1.4.5 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.13
main
zstd-libs 1.4.5 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.13
main
zstd-dev 1.4.5 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux 3.13
main
zstd-doc 1.4.5 Potentially vulnerable - aklitzing@gmail.com
Alpine Linux Edge
main
zstd-static 1.4.9 - aklitzing@gmail.com
Alpine Linux Edge
main
pzstd 1.4.9 - aklitzing@gmail.com
Alpine Linux Edge
main
zstd-doc 1.4.9 - aklitzing@gmail.com
Alpine Linux Edge
main
zstd 1.4.9 - aklitzing@gmail.com
Alpine Linux Edge
main
zstd-dev 1.4.9 - aklitzing@gmail.com
Alpine Linux Edge
main
zstd-libs 1.4.9 - aklitzing@gmail.com
ALT Linux p9 zstd 1.4.3 Potentially vulnerable Archiving/Compression ldv@altlinux.org
ALT Sisyphus zstd 1.4.5 Potentially vulnerable Archiving/Compression ldv@altlinux.org
Amazon Linux 2 zstd 1.3.3 Potentially vulnerable Unspecified -
Amazon Linux 2 zstd 1.3.3 Potentially vulnerable Unspecified -
AOSC zstd 1.4.5 Potentially vulnerable utils fallback-mnt-aosc@repology
AOSC zstd-static 1.4.5 Potentially vulnerable utils fallback-mnt-aosc@repology
Apertis v2020
v2020/target
libzstd 1.3.8 Potentially vulnerable main debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Apertis v2021
v2021/target
libzstd 1.3.8 Potentially vulnerable main debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Apertis v2022 Development
v2022dev2/target
libzstd 1.4.8 Potentially vulnerable main debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Arch
core
zstd 1.4.9 - -
Arch
multilib
lib32-zstd 1.4.9 - -
Arch Testing
testing
zstd 1.5.0 - -
Arch Testing
multilib-testing
lib32-zstd 1.5.0 - -
AUR lib32-zstd-git 1.4.7 - shoober420@aur
AUR zstd-git 1.4.4.r598.gf03192c1 - jforberg@aur
AUR zstd-static 1.4.9 - thrasibule@aur
Artix
system
zstd 1.4.9 - -
Astra Orel Stable
main
libzstd 1.1.2 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com
Astra Orel Current
main
libzstd 1.1.2 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com
Ataraxia Linux zstd 1.4.9 base nagakamira@gmail.com
Carbs Linux
core
zstd 1.4.9 - cem@ckyln.com
CentOS 8
BaseOS
zstd 1.4.4 Potentially vulnerable Unspecified bugs@centos.org
CentOS 8
BaseOS
zstd 1.4.2 Potentially vulnerable Unspecified bugs@centos.org
Chakra
core
zstd 1.3.3 Potentially vulnerable - -
Chaotic-AUR zstd-git 1.5.0.r8798.g8a53a882 - -
Chocolatey Zstandard 1.4.9.20210319 - -
ConanCenter zstd 1.4.9 - -
ConanCenter zstd 1.4.8 Potentially vulnerable - -
ConanCenter zstd 1.4.7 Potentially vulnerable - -
ConanCenter zstd 1.4.5 Potentially vulnerable - -
ConanCenter zstd 1.4.4 Potentially vulnerable - -
ConanCenter zstd 1.4.3 Potentially vulnerable - -
ConanCenter zstd 1.3.8 Potentially vulnerable - -
ConanCenter zstd 1.3.5 Potentially vulnerable - -
CRUX 3.4
opt
zstd 1.4.0 Potentially vulnerable - fredrik@crux.nu
CRUX 3.5
opt
zstd 1.4.5 Potentially vulnerable - fredrik@crux.nu
CRUX 3.5
compat-32
zstd-32 1.4.5 Potentially vulnerable - compat-32-ports@crux.nu
CRUX 3.6
core
zstd 1.5.0 - core-ports@crux.nu
CRUX 3.6
compat-32
zstd-32 1.4.9 - compat-32-ports@crux.nu
Cygwin libzstd-devel 1.4.9 Libs achim.gratz@cygwin
Cygwin libzstd1 1.4.9 Libs achim.gratz@cygwin
Cygwin zstd 1.4.9 Archive achim.gratz@cygwin
Cygwin zstd-debuginfo 1.4.9 Debug achim.gratz@cygwin
Debian Oldstable
oldstable/main
libzstd 1.1.2 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com
Debian Stable
stable/main
libzstd 1.3.8 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Debian Stable Backports
main
libzstd 1.4.4 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Debian Testing
testing/main
libzstd 1.4.8 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Debian Unstable
main
libzstd 1.4.8 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Deepin
main
libzstd 1.3.8 Potentially vulnerable - debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Devuan 2.0 (ASCII)
ascii/main
libzstd 1.1.2 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com
Devuan 3.0 (Beowulf)
beowulf/main
libzstd 1.3.8 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
libzstd 1.4.8 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Devuan Unstable
unstable/main
libzstd 1.4.8 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
DPorts archivers/zstd 1.4.8 Potentially vulnerable archivers sunpoet@freebsd.org
Entware
x64-k3.2
zstd 1.4.9 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
libzstd 1.4.9 libs fallback-mnt-entware@repology
Entware
aarch64-k3.10
libzstd 1.4.9 libs fallback-mnt-entware@repology
Entware
aarch64-k3.10
zstd 1.4.9 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
libzstd 1.4.9 libs fallback-mnt-entware@repology
Entware
armv5sf-k3.2
zstd 1.4.9 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
libzstd 1.4.9 libs fallback-mnt-entware@repology
Entware
armv7sf-k2.6
zstd 1.4.9 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
zstd 1.4.9 utils fallback-mnt-entware@repology
Entware
mipselsf-k3.4
libzstd 1.4.9 libs fallback-mnt-entware@repology
Entware
mipselsf-k3.4
zstd 1.4.9 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
libzstd 1.4.9 libs fallback-mnt-entware@repology
Entware
mipssf-k3.4
zstd 1.4.9 utils fallback-mnt-entware@repology
Entware
x64-k3.2
libzstd 1.4.9 libs fallback-mnt-entware@repology
EPEL 6 zstd 1.4.5 Potentially vulnerable Unspecified -
EPEL 7 zstd 1.4.9 Unspecified -
Exherbo
arbor
app-arch/zstd 1.4.9 app-arch fallback-mnt-exherbo@repology
Fedora 26
updates
zstd 1.3.4 Potentially vulnerable Unspecified -
Fedora 26
release
zstd 1.2.0 Potentially vulnerable Unspecified -
Fedora 27
updates
zstd 1.3.6 Potentially vulnerable Unspecified -
Fedora 27
release
zstd 1.3.1 Potentially vulnerable Unspecified -
Fedora 28
updates
zstd 1.4.0 Potentially vulnerable Unspecified -
Fedora 28
release
zstd 1.3.4 Potentially vulnerable Unspecified -
Fedora 29
updates
zstd 1.4.2 Potentially vulnerable Unspecified -
Fedora 29
release
zstd 1.3.6 Potentially vulnerable Unspecified -
Fedora 30
updates
zstd 1.4.4 Potentially vulnerable Unspecified -
Fedora 30
release
zstd 1.3.8 Potentially vulnerable Unspecified -
Fedora 31
updates
zstd 1.4.5 Potentially vulnerable Unspecified -
Fedora 31
release
zstd 1.4.2 Potentially vulnerable Unspecified -
Fedora 32
updates
zstd 1.4.9 Unspecified -
Fedora 32
release
zstd 1.4.4 Potentially vulnerable Unspecified -
Fedora 33
updates
zstd 1.4.9 Unspecified -
Fedora 33
release
zstd 1.4.5 Potentially vulnerable Unspecified -
Fedora 34
development
zstd 1.4.9 Unspecified -
Fedora Rawhide zstd 1.4.9 Unspecified -
FreeBSD Ports archivers/zstd 1.4.9 archivers sunpoet@freebsd.org
Funtoo 1.4
core-kit
app-arch/zstd 1.4.9 app-arch fallback-mnt-funtoo@repology
Gentoo app-arch/zstd 1.5.0 app-arch patrick@gentoo.org, base-system@gentoo.org
Gentoo app-arch/zstd 1.4.9 app-arch patrick@gentoo.org, base-system@gentoo.org
GoboLinux Zstd 1.4.4 Potentially vulnerable - -
HaikuPorts master app-arch/zstd 1.4.5 Potentially vulnerable app-arch -
HaikuPorts master app-arch/zstd 1.1.2 Potentially vulnerable app-arch -
Homebrew zstd 1.4.9 - -
HP-UX 11.31
ia64_64
zstd 1.4.8 Potentially vulnerable - -
HP-UX 11.31
hppa_32
zstd 1.4.5 Potentially vulnerable - -
HP-UX 11.31
ia64_64
zstd 1.4.5 Potentially vulnerable - -
Hyperbola
community
zstd 1.1.4 Potentially vulnerable - -
IBM i zstd 1.4.4 Potentially vulnerable Unspecified -
Kali Linux Rolling
main
libzstd 1.4.8 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
KaOS
core
zstd 1.4.9 - demm@kaosx.us
KaOS Build
build
zstd 1.5.0 - demm@kaosx.us
KISS Linux Main
extra
zstd 1.5.0 - dilyn.corner@k1sslinux.org
LiGurOS stable app-arch/zstd 1.4.9 app-arch patrick@gentoo.org, base-system@gentoo.org
LiGurOS develop app-arch/zstd 1.5.0 app-arch patrick@gentoo.org, base-system@gentoo.org
LiGurOS develop app-arch/zstd 1.4.9 app-arch patrick@gentoo.org, base-system@gentoo.org
Linuxbrew zstd 1.4.9 - -
MacPorts zstd 1.5.0 archivers nomaintainer@macports.org
Mageia 6
core/updates
zstd 1.3.8 Potentially vulnerable Archiving/Compression -
Mageia 6
core/updates
zstd 1.3.2 Potentially vulnerable Archiving/Compression -
Mageia 7
core/release
zstd 1.4.0 Potentially vulnerable Archiving/Compression -
Mageia 8
core/release
zstd 1.4.8 Potentially vulnerable Archiving/Compression -
Mageia Cauldron
core/release
zstd 1.5.0 Archiving/Compression -
Manjaro Stable
core
zstd 1.4.9 - -
Manjaro Testing
core
zstd 1.4.9 - -
Manjaro Unstable
core
zstd 1.4.9 - -
MidnightBSD mports archivers/zstd 1.4.5 Potentially vulnerable archivers -
MSYS2 mingw
x86_64
mingw-w64-x86_64-zstd 1.4.9 - -
MSYS2 mingw
i686
mingw-w64-i686-zstd 1.4.9 - -
MSYS2 msys2
x86_64
libzstd 1.5.0 - -
MSYS2 msys2
x86_64
libzstd-devel 1.5.0 development -
MSYS2 msys2
x86_64
zstd 1.5.0 libraries -
MSYS2 msys2
i686
libzstd 1.4.4 Potentially vulnerable - alexpux@gmail.com
MSYS2 msys2
i686
libzstd-devel 1.4.4 Potentially vulnerable development alexpux@gmail.com
MSYS2 msys2
i686
zstd 1.4.4 Potentially vulnerable libraries alexpux@gmail.com
MX Linux MX-17 Testing
test
libzstd 1.4.5 Potentially vulnerable libs stevep@mxlinux.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
MX Linux MX-19 Testing
test
libzstd 1.4.5 Potentially vulnerable libs stevep@mxlinux.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
nixpkgs stable zstd 1.4.5 Potentially vulnerable - orivej@gmx.fr
nixpkgs unstable zstd 1.4.9 - orivej@gmx.fr
OpenBSD Ports archivers/zstd 1.4.9 archivers bket@openbsd.org
openEuler 20.03
source
zstd 1.3.6 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
zstd 1.4.9 Applications/System Utilities -
OpenIndiana packages
hipster
zstd 1.4.8 Potentially vulnerable Applications/System Utilities -
OpenIndiana packages
hipster
zstd 1.4.7 Potentially vulnerable Applications/System Utilities -
OpenIndiana packages
hipster
zstd 1.4.5 Potentially vulnerable Applications/System Utilities -
openmamba
devel-makedist
zstd 1.5.0 Applications/Archiving silvan.calarco@mambasoft.it
openmamba
devel
zstd 1.4.9 Applications/Archiving silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
zstd 1.4.0 Potentially vulnerable Archiving/Compression bero@lindev.ch
OpenMandriva Cooker
main/release
zstd 1.5.0 Archiving/Compression tpgxyz@gmail.com
OpenPKG zstd 1.5.0 Compression -
openSUSE Leap 42.3
updates/oss
zstd 1.3.3 Potentially vulnerable Productivity/Archiving/Compression -
openSUSE Leap 15.0
updates/oss
zstd 1.4.2 Potentially vulnerable Productivity/Archiving/Compression -
openSUSE Leap 15.0
updates/oss
zstd 1.4.2 Potentially vulnerable Productivity/Archiving/Compression -
openSUSE Leap 15.0
main/oss
zstd 1.3.4 Potentially vulnerable Productivity/Archiving/Compression -
openSUSE Leap 15.1
updates/oss
zstd 1.4.4 Potentially vulnerable Productivity/Archiving/Compression -
openSUSE Leap 15.1
updates/oss
zstd 1.4.2 Potentially vulnerable Productivity/Archiving/Compression -
openSUSE Leap 15.1
main/oss
zstd 1.3.4 Potentially vulnerable Productivity/Archiving/Compression -
openSUSE Leap 15.2
main/oss
zstd 1.4.4 Potentially vulnerable Productivity/Archiving/Compression -
openSUSE Leap 15.2
updates/oss
zstd 1.4.4 Potentially vulnerable Productivity/Archiving/Compression -
openSUSE Leap 15.3
main/oss
zstd 1.4.4 Potentially vulnerable Productivity/Archiving/Compression -
openSUSE Tumbleweed
src-oss
zstd 1.4.9 Productivity/Archiving/Compression -
OpenWrt 19.07 x86_64
packages
libzstd 1.4.5 Potentially vulnerable libs fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
packages
zstd 1.4.5 Potentially vulnerable utils fallback-mnt-openwrt@repology
Parabola
core
zstd 1.4.9 - -
Parabola Testing
testing
zstd 1.5.0 - -
Pardus 17
main
libzstd 1.1.2 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com
Pardus 19
main
libzstd 1.3.8 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Pardus 19
main
libzstd 1.3.8 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Pardus 19
updates/main
libzstd 1.3.8 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Parrot
main
libzstd 1.4.8 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
PCLinuxOS zstd 1.4.9 Archiving/Compression -
Pisi Linux
core
zstd 1.4.5 Potentially vulnerable library idriskalp@gmail.com
Pisi Linux
main
zstd 1.4.4 Potentially vulnerable app:console admins@pisilinux.org
pkgsrc current archivers/zstd 1.4.9 archivers pkgsrc-users@netbsd.org
PLD Linux zstd 1.4.9 - -
PureOS Amber libzstd 1.3.8 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
PureOS landing libzstd 1.4.8 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Raspbian Oldstable
main
libzstd 1.1.2 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com
Raspbian Stable
main
libzstd 1.3.8 Potentially vulnerable libs debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Raspbian Testing
main
libzstd 1.4.8 Potentially vulnerable libs debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Ravenports Zstandard 1.4.9 archivers fallback-mnt-ravenports@repology
Rocky Linux 8
BaseOS
zstd 1.4.4 Potentially vulnerable Unspecified infrastructure@rockylinux.org
Rosa 2016.1
main/updates
zstd 1.4.3 Potentially vulnerable - -
Rosa 2019.1
main/release
zstd 1.4.8 Potentially vulnerable Archiving/Compression alexander@mezon.ru
Rosa Server 7.3
extra/release
zstd 1.4.5 Potentially vulnerable Unspecified a.gaidukov@rosalinux.ru
Scoop
main
zstd 1.5.0 - -
Slackware current
slackware
zstd 1.4.9 - volkerdi@slackware.com
Slackware64 current
slackware64
zstd 1.4.9 - volkerdi@slackware.com
Slackwarearm current
slackware
zstd 1.4.9 - volkerdi@slackware.com
SliTaz Cooking zstd 1.4.5 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Cooking zstd-dev 1.4.5 Potentially vulnerable development pascal.bellard@slitaz.org
SliTaz Next zstd 1.3.3 Potentially vulnerable base-system pascal.bellard@slitaz.org
SliTaz Next zstd-dev 1.3.3 Potentially vulnerable development pascal.bellard@slitaz.org
Solus zstd 1.4.8 Potentially vulnerable system.utils pyu@riseup.net
Solus zstd-32bit 1.4.8 Potentially vulnerable emul32 pyu@riseup.net
Solus zstd-32bit-dbginfo 1.4.8 Potentially vulnerable debug pyu@riseup.net
Solus zstd-32bit-devel 1.4.8 Potentially vulnerable programming.devel pyu@riseup.net
Solus zstd-dbginfo 1.4.8 Potentially vulnerable debug pyu@riseup.net
Solus zstd-devel 1.4.8 Potentially vulnerable programming.devel pyu@riseup.net
T2 SDE zstd 1.5.0 base/tool rene@t2-project.org
Termux zstd 1.4.9 - termux@termux
Trisquel 8.0
flidas-updates/main
libzstd 1.3.1 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, kdmfoss@gmail.com, osallou@debian.org
Trisquel 8.0
flidas/main
libzstd 0.5.1 Potentially vulnerable universe/misc debian-med-packaging@lists.alioth.debian.org, spam@kdmurray.id.au
Trisquel 9.0
etiona/main
libzstd 1.3.3 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, alex@biotec.tu-dresden.de, kdmfoss@gmail.com, osallou@debian.org
Trisquel 9.0
etiona-updates/main
libzstd 1.3.3 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, alex@biotec.tu-dresden.de, kdmfoss@gmail.com, osallou@debian.org
Ubuntu 16.04
xenial-updates/main
libzstd 1.3.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, kdmfoss@gmail.com, osallou@debian.org
Ubuntu 16.04
xenial/universe
libzstd 0.5.1 Potentially vulnerable universe/misc debian-med-packaging@lists.alioth.debian.org, spam@kdmurray.id.au
Ubuntu 18.04
bionic/main
libzstd 1.3.3 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, alex@biotec.tu-dresden.de, kdmfoss@gmail.com, osallou@debian.org
Ubuntu 18.04
bionic-updates/main
libzstd 1.3.3 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, alex@biotec.tu-dresden.de, kdmfoss@gmail.com, osallou@debian.org
Ubuntu 20.04
focal/main
libzstd 1.4.4 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Ubuntu 20.04
focal-updates/main
libzstd 1.4.4 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Ubuntu 20.10
groovy/main
libzstd 1.4.5 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Ubuntu 20.10
groovy-updates/main
libzstd 1.4.5 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Ubuntu 21.04
hirsute/main
libzstd 1.4.8 Potentially vulnerable misc debian-med-packaging@lists.alioth.debian.org, kdmfoss@gmail.com, mestia@debian.org, osallou@debian.org
Vcpkg zstd 1.4.9 - -
Void Linux x86_64
x86_64
libzstd 1.4.9 - orphan@voidlinux.org
Void Linux x86_64
x86_64
libzstd-devel 1.4.9 - orphan@voidlinux.org
Void Linux x86_64
x86_64
zstd 1.4.9 - orphan@voidlinux.org
Wikidata Zstandard 1.5.0 - -