Versions Packages Information History CVEs Badges Report

Versions for lrzip

149 package(s) known

Repository Package name Version Category Maintainer(s)
AIX Open Source Packages lrzip 0.606 - -
AIX Open Source Packages lrzip 0.571 - -
AIX Open Source Packages lrzip 0.570 - -
AIX Open Source Packages lrzip 0.560 - -
AIX Open Source Packages lrzip 0.47 - -
AIX Open Source Packages lrzip 0.44 - -
Alpine Linux 3.15
community
lrzip-doc 0.641 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.15
community
lrzip-dev 0.641 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.15
community
lrzip 0.641 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.16
community
lrzip 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.16
community
lrzip-doc 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.17
community
lrzip-doc 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.17
community
lrzip 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.17
community
lrzip-extra-scripts 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.18
community
lrzip 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.18
community
lrzip-doc 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.18
community
lrzip-extra-scripts 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.19
community
lrzip 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.19
community
lrzip-doc 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.19
community
lrzip-extra-scripts 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.20
community
lrzip 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.20
community
lrzip-doc 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.20
community
lrzip-extra-scripts 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.21
community
lrzip 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.21
community
lrzip-doc 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.21
community
lrzip-extra-scripts 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.22
community
lrzip 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.22
community
lrzip-doc 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux 3.22
community
lrzip-extra-scripts 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux Edge
community
lrzip 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux Edge
community
lrzip-doc 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
Alpine Linux Edge
community
lrzip-extra-scripts 0.651 Potentially vulnerable - robertoguimaraes8@gmail.com
ALT Linux p9 lrzip 0.631 Potentially vulnerable File tools george@altlinux.org
ALT Linux p10 lrzip 0.631 Potentially vulnerable File tools george@altlinux.org
ALT Linux p11 lrzip 0.631 Potentially vulnerable File tools george@altlinux.org
ALT Sisyphus lrzip 0.631 Potentially vulnerable File tools george@altlinux.org
AOSC lrzip 0.651 Potentially vulnerable utils fallback-mnt-aosc@repology
Arch Linux
extra
lrzip 0.651 Potentially vulnerable - -
Arch Linux 32 i486
extra
lrzip 0.651 Potentially vulnerable - -
Arch Linux 32 i686
extra
lrzip 0.651 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
lrzip 0.651 Potentially vulnerable - -
Arch Linux ARM aarch64
community
lrzip 0.651 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
lrzip 0.651 Potentially vulnerable - -
ArchPOWER powerpc lrzip 0.651 Potentially vulnerable - -
ArchPOWER powerpc64le lrzip 0.651 Potentially vulnerable - -
ArchPOWER riscv64 lrzip 0.651 Potentially vulnerable - -
AUR lrzip-git 0.651.r12.g15f5621 - a821@aur
Artix
world
lrzip 0.651 Potentially vulnerable - -
Chromebrew lrzip 0.651 Potentially vulnerable - -
Cygwin liblrzip-devel 0.631 Potentially vulnerable Archive orphaned@cygwin
Cygwin liblrzip0 0.631 Potentially vulnerable Archive orphaned@cygwin
Cygwin lrzip 0.631 Potentially vulnerable Archive orphaned@cygwin
Cygwin lrzip-debuginfo 0.631 Potentially vulnerable Debug orphaned@cygwin
Debian 10
buster/main
lrzip 0.631+git180528 utils gcs@debian.org
Debian 10
buster/updates/main
lrzip 0.631+git180528 utils gcs@debian.org
Debian 11
bullseye/main
lrzip 0.641 Potentially vulnerable utils gcs@debian.org
Debian 11
bullseye-security/main
lrzip 0.641 Potentially vulnerable utils gcs@debian.org
Debian 12
bookworm/main
lrzip 0.651 Potentially vulnerable utils gcs@debian.org
Debian 13
trixie/main
lrzip 0.651 Potentially vulnerable utils gcs@debian.org
Debian Unstable
sid/main
lrzip 0.651 Potentially vulnerable utils gcs@debian.org
deepin 20
main
lrzip 0.631+git180528 - gcs@debian.org
Devuan 3.0
beowulf/main
lrzip 0.631+git180528 utils gcs@debian.org
Devuan 4.0
chimaera/main
lrzip 0.641 Potentially vulnerable utils gcs@debian.org
Devuan Unstable
unstable/main
lrzip 0.651 Potentially vulnerable utils gcs@debian.org
EPEL 6 lrzip 0.616 Applications/File -
FreeBSD Ports archivers/lrzip 0.651 Potentially vulnerable archivers delphij@freebsd.org
Gentoo app-arch/lrzip 0.651 Potentially vulnerable app-arch kumba@gentoo.org
GNU Guix lrzip 0.651 Potentially vulnerable - -
HaikuPorts master app-arch/lrzip 0.631 Potentially vulnerable app-arch -
Homebrew lrzip 0.641 Potentially vulnerable - -
Kali Linux Rolling
main
lrzip 0.651 Potentially vulnerable utils gcs@debian.org
LiGurOS stable app-arch/lrzip 0.651 Potentially vulnerable app-arch kumba@gentoo.org
LiGurOS develop app-arch/lrzip 0.651 Potentially vulnerable app-arch kumba@gentoo.org
MacPorts lrzip 0.631 Potentially vulnerable archivers nomaintainer@macports.org
Mageia cauldron
core/release
lrzip 0.651 Potentially vulnerable Archiving/Compression -
Manjaro Stable
extra
lrzip 0.651 Potentially vulnerable - -
Manjaro Testing
extra
lrzip 0.651 Potentially vulnerable - -
Manjaro Unstable
extra
lrzip 0.651 Potentially vulnerable - -
nixpkgs stable 22.11 lrzip 0.651 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 23.05 lrzip 0.651 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 23.11 lrzip 0.651 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 24.05 lrzip 0.651 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 24.11 lrzip 0.651 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs stable 25.05 lrzip 0.651 Potentially vulnerable - fallback-mnt-nix@repology
nixpkgs unstable lrzip 0.651 Potentially vulnerable - fallback-mnt-nix@repology
OpenBSD Ports archivers/lrzip 0.651 Potentially vulnerable archivers porting@use.startmail.com
openmamba
base
lrzip 0.651 Potentially vulnerable Applications/Archiving silvan.calarco@mambasoft.it
OpenMandriva 4.3
unsupported/release
lrzip 0.641 Potentially vulnerable Archiving/Compression angrypenguinpoland@gmail.com
OpenMandriva 5.0
unsupported/release
lrzip 0.641 Potentially vulnerable Archiving/Compression angrypenguinpoland@gmail.com
OpenMandriva 6.0
unsupported/release
lrzip 0.641 Potentially vulnerable Archiving/Compression angrypenguinpoland@gmail.com
OpenMandriva Rolling
unsupported/release
lrzip 0.641 Potentially vulnerable Archiving/Compression angrypenguinpoland@gmail.com
OpenMandriva Cooker
unsupported/release
lrzip 0.641 Potentially vulnerable Archiving/Compression angrypenguinpoland@gmail.com
OpenPKG lrzip 0.631 Potentially vulnerable Compression -
openSUSE Tumbleweed
src-oss
lrzip 0.651 Potentially vulnerable Unspecified -
Parabola
extra
lrzip 0.651 Potentially vulnerable - -
Pardus 21
updates/main
lrzip 0.641 Potentially vulnerable utils gcs@debian.org
Pardus 21
main
lrzip 0.641 Potentially vulnerable utils gcs@debian.org
Parrot
parrot/main
lrzip 0.651 Potentially vulnerable utils gcs@debian.org
Parrot
parrot-updates/main
lrzip 0.651 Potentially vulnerable utils gcs@debian.org
PCLinuxOS lrzip 0.651 Potentially vulnerable Archiving/Compression -
pkgsrc current archivers/lrzip 0.631 Potentially vulnerable archivers tm@netbsd.org
PLD Linux lrzip 0.621 Potentially vulnerable - -
PureOS amber
amber/main
lrzip 0.631+git180528 utils gcs@debian.org
PureOS byzantium
byzantium/main
lrzip 0.641 Potentially vulnerable utils gcs@debian.org
PureOS landing
landing/main
lrzip 0.651 Potentially vulnerable utils gcs@debian.org
Raspbian Oldstable
main
lrzip 0.641 Potentially vulnerable utils gcs@debian.org
Raspbian Stable
main
lrzip 0.651 Potentially vulnerable utils gcs@debian.org
Raspbian Testing
main
lrzip 0.651 Potentially vulnerable utils gcs@debian.org
Rosa 2021.1
contrib/release
lrzip 0.641 Potentially vulnerable Archiving/Compression alexander@mezon.ru
Rosa 13
main/release
lrzip 0.651 Potentially vulnerable Archiving/Compression alexander@mezon.ru
Side Linux lrzip 0.651 Potentially vulnerable - uglyside@yandex.ru
Slackware 14.2
slackware
lrzip 0.621 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
lrzip 0.641 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
lrzip 0.651 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
lrzip 0.621 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
lrzip 0.641 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
lrzip 0.651 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
lrzip 0.621 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
lrzip 0.641 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking lrzip 0.651 Potentially vulnerable utilities maintainer@slitaz.org
SliTaz Next lrzip 0.630 utilities devel@slitaz.org
SliTaz Next lrzip 0.630 utilities devel@slitaz.org
Solus lrzip 0.651 Potentially vulnerable system.utils algent@protonmail.com
Solus lrzip-dbginfo 0.651 Potentially vulnerable debug algent@protonmail.com
Spack lrzip master - fallback-mnt-spack@repology
Spack lrzip 0.651 Potentially vulnerable - fallback-mnt-spack@repology
Termux lrzip 0.651 Potentially vulnerable - termux@github
Trisquel 10.0
nabia-updates/main
lrzip 0.631+git180528 universe/utils gcs@debian.org
Trisquel 10.0
nabia-security/main
lrzip 0.631+git180528 universe/utils gcs@debian.org
Trisquel 10.0
nabia/main
lrzip 0.631+git180528 universe/utils gcs@debian.org
Trisquel 11.0
aramo-security/main
lrzip 0.651 Potentially vulnerable universe/utils ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 11.0
aramo/main
lrzip 0.651 Potentially vulnerable universe/utils gcs@debian.org
Trisquel 11.0
aramo-updates/main
lrzip 0.651 Potentially vulnerable universe/utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty/universe
lrzip 0.616 universe/utils gcs@debian.org
Ubuntu 16.04
xenial/universe
lrzip 0.621 Potentially vulnerable universe/utils gcs@debian.org
Ubuntu 18.04
bionic-updates/universe
lrzip 0.631 Potentially vulnerable universe/utils gcs@debian.org
Ubuntu 18.04
bionic/universe
lrzip 0.631 Potentially vulnerable universe/utils gcs@debian.org
Ubuntu 20.04
focal/universe
lrzip 0.631+git180528 universe/utils gcs@debian.org
Ubuntu 20.04
focal-updates/universe
lrzip 0.631+git180528 universe/utils gcs@debian.org
Ubuntu 22.04
jammy-updates/universe
lrzip 0.651 Potentially vulnerable universe/utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 22.04
jammy/universe
lrzip 0.651 Potentially vulnerable universe/utils gcs@debian.org
Ubuntu 24.04
noble/universe
lrzip 0.651 Potentially vulnerable universe/utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 24.10
oracular/universe
lrzip 0.651 Potentially vulnerable universe/utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 25.04
plucky/universe
lrzip 0.651 Potentially vulnerable universe/utils ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 25.10
questing/universe
lrzip 0.651 Potentially vulnerable universe/utils gcs@debian.org
Void Linux x86_64
x86_64
lrzip 0.651 Potentially vulnerable - orphan@voidlinux.org
Void Linux x86_64
x86_64
liblrzip 0.641 Potentially vulnerable - orphan@voidlinux.org
Void Linux x86_64
x86_64
lrzip-devel 0.641 Potentially vulnerable - orphan@voidlinux.org
Wikidata Lrzip 0.651 Potentially vulnerable - -