Versions Packages Information History CVEs Related Badges Report

Versions for crmsh

99 package(s) known

Repository Package name Version Category Maintainer(s)
ALT Linux p9 crmsh 3.0.3 Potentially vulnerable System/Configuration/Other rider@altlinux.org
AUR crmsh-git 4.2.0.r102.geaa14889 - bidulock@aur
AUR crmsh 4.2.0 Potentially vulnerable - bidulock@aur
Astra Orel Stable
main
crmsh 2.3.2 Potentially vulnerable admin debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, valentin.vidic@carnet.hr
Astra Orel Current
main
crmsh 2.3.2 Potentially vulnerable admin debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, valentin.vidic@carnet.hr
Debian 9
stretch/main
crmsh 2.3.2 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, valentin.vidic@carnet.hr
Debian 10
buster/main
crmsh 4.0.0~git20190108.3d56538 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Debian 11
bullseye/main
crmsh 4.2.1 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Debian 12
bookworm/main
crmsh 4.2.1 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Debian Stable
stable/main
crmsh 4.2.1 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Debian Testing
testing/main
crmsh 4.2.1 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Debian Unstable
sid/main
crmsh 4.2.1 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Deepin
main
crmsh 4.0.0.1 Potentially vulnerable - debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Devuan 2.0
ascii/main
crmsh 2.3.2 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, valentin.vidic@carnet.hr
Devuan 3.0
beowulf/main
crmsh 4.0.0~git20190108.3d56538 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Devuan 4.0
chimaera/main
crmsh 4.2.1 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Devuan Unstable
unstable/main
crmsh 4.2.1 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
DPorts net-mgmt/crmsh 4.2.1 Potentially vulnerable net-mgmt egypcio@freebsd.org
FreeBSD Ports net-mgmt/crmsh 4.3.1 net-mgmt egypcio@freebsd.org
Funtoo 1.4
nokit
sys-cluster/crmsh 3.0.3 Potentially vulnerable sys-cluster cluster@gentoo.org
Funtoo 1.4
nokit
sys-cluster/crmsh 2.1.1 Potentially vulnerable sys-cluster cluster@gentoo.org
Gentoo sys-cluster/crmsh 4.2.1 Potentially vulnerable sys-cluster cluster@gentoo.org
Kali Linux Rolling
main
crmsh 4.2.1 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
LiGurOS stable sys-cluster/crmsh 4.2.1 Potentially vulnerable sys-cluster cluster@gentoo.org
LiGurOS develop sys-cluster/crmsh 4.2.1 Potentially vulnerable sys-cluster cluster@gentoo.org
Mageia 7
core/updates
crmsh 4.2.0 Potentially vulnerable System/Base -
Mageia 7
core/release
crmsh 3.0.3 Potentially vulnerable System/Base -
Mageia 8
core/release
crmsh 4.2.0 Potentially vulnerable System/Base -
Mageia Cauldron
core/release
crmsh 4.2.0 Potentially vulnerable System/Base -
OpenIndiana packages
hipster
crmsh 4.1.0 Potentially vulnerable System/Shells -
openSUSE Leap 42.3
updates/oss
crmsh 3.0.3 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 42.3
updates/oss
crmsh 3.0.3 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 42.3
main/oss
crmsh 3.0.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.0
updates/oss
crmsh 4.1.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.0
updates/oss
crmsh 4.0.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.0
main/oss
crmsh 4.0.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.1.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.1.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.1.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.1.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.1.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.1.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.1.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.1.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.1.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.1.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
updates/oss
crmsh 4.0.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.1
main/oss
crmsh 4.0.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.3.1 Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.3.1 Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.3.1 Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.3.0 Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.3.0 Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.3.0 Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.2
updates/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.2
main/oss
crmsh 4.2.0 Potentially vulnerable Productivity/Clustering/HA -
openSUSE Leap 15.3
main/oss
crmsh 4.3.0 Productivity/Clustering/HA -
openSUSE Tumbleweed
src-oss
crmsh 4.3.1 Productivity/Clustering/HA -
Pardus 17
main
crmsh 2.3.2 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, valentin.vidic@carnet.hr
Pardus 19
main
crmsh 4.0.0~git20190108.3d56538 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Pardus 21
main
crmsh 4.2.1 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Parrot
main
crmsh 4.2.1 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
PLD Linux crmsh 3.0.0 Potentially vulnerable - -
PureOS Amber crmsh 4.0.0~git20190108.3d56538 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
PureOS landing crmsh 4.2.1 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Raspbian Oldstable
main
crmsh 4.0.0~git20190108.3d56538 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Raspbian Stable
main
crmsh 4.2.1 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Raspbian Testing
main
crmsh 4.2.1 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Rosa Server 6.9
extra/release
crmsh 1.2.6 Potentially vulnerable System Environment/Daemons andrew.lukoshko@rosalab.ru
SlackBuilds system/crmsh 2.2.1 Potentially vulnerable system commer206@gmail.com
Trisquel 7.0
belenos/main
crmsh 1.2.5+hg1034 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, madkiss@debian.org
Trisquel 7.0
belenos-updates/main
crmsh 1.2.5+hg1034 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, madkiss@debian.org
Trisquel 8.0
flidas/main
crmsh 2.2.0 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, madkiss@debian.org, myon@debian.org, rik@mmogp.com
Trisquel 9.0
etiona/main
crmsh 3.0.1 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, adrian.vondendriesch@credativ.de, rik@mmogp.com, valentin.vidic@carnet.hr
Trisquel 10.0
nabia/main
crmsh 4.2.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Ubuntu 14.04
trusty-updates/main
crmsh 1.2.5+hg1034 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, madkiss@debian.org
Ubuntu 14.04
trusty/main
crmsh 1.2.5+hg1034 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, madkiss@debian.org
Ubuntu 16.04
xenial/main
crmsh 2.2.0 Potentially vulnerable misc debian-ha-maintainers@lists.alioth.debian.org, madkiss@debian.org, myon@debian.org, rik@mmogp.com
Ubuntu 18.04
bionic/universe
crmsh 3.0.1 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, adrian.vondendriesch@credativ.de, rik@mmogp.com, valentin.vidic@carnet.hr
Ubuntu 20.04
focal/main
crmsh 4.2.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Ubuntu 20.10
groovy/main
crmsh 4.2.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Ubuntu 21.04
hirsute/main
crmsh 4.2.0 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Ubuntu 21.10
impish/main
crmsh 4.2.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Ubuntu 22.04
jammy/main
crmsh 4.2.1 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, adrian.vondendriesch@credativ.de, rik@mmogp.com, vvidic@debian.org
Wikidata crmsh 4.1.0 Potentially vulnerable - -