Versions Packages Information History CVEs Related Badges Report

Versions for puppet

113 package(s) known

Repository Package name Version Category Maintainer(s)
ALT Linux p9 puppet 6.8.0 Potentially vulnerable System/Servers cas@altlinux.org
ALT Sisyphus puppet 6.15.0 Potentially vulnerable System/Servers cas@altlinux.org
Amazon Linux 1
main
puppet3 3.7.4 Potentially vulnerable System Environment/Base -
Amazon Linux 1
main
puppet 2.7.25 Potentially vulnerable System Environment/Base -
Arch
community
puppet 6.14.0 Potentially vulnerable - -
Arch
community
puppet5 5.5.19 Potentially vulnerable - -
AUR puppet-git 4.3.2.r210.g6bb616d - jose1711@aur
AUR puppet3 3.8.7 Potentially vulnerable - sulaweyo@aur
Astra Orel Stable
main
puppet 4.8.2 Potentially vulnerable admin pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Astra Orel Current
main
puppet 4.8.2 Potentially vulnerable admin pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Chocolatey Puppet (Install) 3.8.7 Potentially vulnerable - -
Debian Oldstable
oldstable/main
puppet 4.8.2 Potentially vulnerable admin pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Debian Stable
stable/main
puppet 5.5.10 Potentially vulnerable admin pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
Debian Testing
testing/main
puppet 5.5.19 Potentially vulnerable admin pkg-puppet-devel@alioth-lists.debian.net, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
Debian Unstable
main
puppet 5.5.19 Potentially vulnerable admin pkg-puppet-devel@alioth-lists.debian.net, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
Deepin
main
puppet 5.4.0 Potentially vulnerable admin pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
Devuan 1.0 (Jessie)
jessie/main
puppet 3.7.2 Potentially vulnerable admin pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Devuan 2.0 (ASCII)
ascii/main
puppet 4.8.2 Potentially vulnerable admin pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
puppet 5.5.10 Potentially vulnerable admin pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
puppet 5.5.19 Potentially vulnerable admin pkg-puppet-devel@alioth-lists.debian.net, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
Devuan Unstable
unstable/main
puppet 5.5.19 Potentially vulnerable admin pkg-puppet-devel@alioth-lists.debian.net, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
DPorts sysutils/puppet6 6.14.0 Potentially vulnerable sysutils puppet@freebsd.org
DPorts sysutils/puppet5 5.5.19 Potentially vulnerable sysutils puppet@freebsd.org
EPEL 7 puppet 3.6.2 Potentially vulnerable Unspecified -
Exherbo
net
app-admin/puppet 3.6.2 Potentially vulnerable app-admin fallback-mnt-exherbo@repology
Fedora 26
release
puppet 4.6.2 Potentially vulnerable System Environment/Base -
Fedora 27
updates
puppet 4.10.10 Potentially vulnerable System Environment/Base -
Fedora 27
release
puppet 4.10.1 Potentially vulnerable System Environment/Base -
Fedora 28
updates
puppet 5.5.10 Potentially vulnerable Unspecified -
Fedora 28
release
puppet 4.10.10 Potentially vulnerable System Environment/Base -
Fedora 29
updates
puppet 5.5.10 Potentially vulnerable Unspecified -
Fedora 29
release
puppet 5.5.1 Potentially vulnerable System Environment/Base -
Fedora 30
updates
puppet 5.5.20 Potentially vulnerable Unspecified -
Fedora 30
release
puppet 5.5.10 Potentially vulnerable Unspecified -
Fedora 31
updates
puppet 5.5.20 Potentially vulnerable Unspecified -
Fedora 31
release
puppet 5.5.10 Potentially vulnerable Unspecified -
Fedora 32
updates
puppet 5.5.20 Potentially vulnerable Unspecified -
Fedora 32
release
puppet 5.5.18 Potentially vulnerable Unspecified -
Fedora Rawhide puppet 5.5.20 Potentially vulnerable Unspecified -
FreeBSD Ports sysutils/puppet6 6.15.0 Potentially vulnerable sysutils puppet@freebsd.org
FreeBSD Ports sysutils/puppet5 5.5.20 Potentially vulnerable sysutils puppet@freebsd.org
Funtoo 1.4
nokit
app-admin/puppet 6.4.2 Potentially vulnerable app-admin prometheanfire@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
Funtoo 1.4
nokit
app-admin/puppet 6.4.1 Potentially vulnerable app-admin prometheanfire@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
Funtoo 1.4
nokit
app-admin/puppet 5.5.14 Potentially vulnerable app-admin prometheanfire@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
Funtoo 1.4
nokit
app-admin/puppet 4.10.12 Potentially vulnerable app-admin prometheanfire@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
Gentoo app-admin/puppet 6.15.0 Potentially vulnerable app-admin prometheanfire@gentoo.org, graaff@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
Gentoo app-admin/puppet 6.14.0 Potentially vulnerable app-admin prometheanfire@gentoo.org, graaff@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
Gentoo app-admin/puppet 5.5.20 Potentially vulnerable app-admin prometheanfire@gentoo.org, graaff@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
Gentoo app-admin/puppet 5.5.19 Potentially vulnerable app-admin prometheanfire@gentoo.org, graaff@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
Hyperbola
community
puppet 4.9.4 Potentially vulnerable - -
Kali Linux Rolling
main
puppet 5.5.19 Potentially vulnerable admin pkg-puppet-devel@alioth-lists.debian.net, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
LiGurOS 20.1
nokit
app-admin/puppet 6.15.0 Potentially vulnerable app-admin prometheanfire@gentoo.org, graaff@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
LiGurOS 20.1
nokit
app-admin/puppet 6.14.0 Potentially vulnerable app-admin prometheanfire@gentoo.org, graaff@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
LiGurOS 20.1
nokit
app-admin/puppet 5.5.20 Potentially vulnerable app-admin prometheanfire@gentoo.org, graaff@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
LiGurOS 20.1
nokit
app-admin/puppet 5.5.19 Potentially vulnerable app-admin prometheanfire@gentoo.org, graaff@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
LiGurOS 20.7
nokit
app-admin/puppet 6.15.0 Potentially vulnerable app-admin prometheanfire@gentoo.org, graaff@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
LiGurOS 20.7
nokit
app-admin/puppet 6.14.0 Potentially vulnerable app-admin prometheanfire@gentoo.org, graaff@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
LiGurOS 20.7
nokit
app-admin/puppet 5.5.20 Potentially vulnerable app-admin prometheanfire@gentoo.org, graaff@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
LiGurOS 20.7
nokit
app-admin/puppet 5.5.19 Potentially vulnerable app-admin prometheanfire@gentoo.org, graaff@gentoo.org, sysadmin@gentoo.org, ruby@gentoo.org
MacPorts puppet 2.7.6 Potentially vulnerable sysutils nomaintainer@macports.org
Mageia 6
core/release
puppet 4.2.1 Potentially vulnerable Monitoring -
Mageia 6
core/updates
puppet 4.2.1 Potentially vulnerable Monitoring -
Mageia 7
core/release
puppet 6.0.3 Potentially vulnerable Monitoring -
Mageia Cauldron
core/release
puppet 6.0.3 Potentially vulnerable Monitoring -
Manjaro Stable
community
puppet 6.14.0 Potentially vulnerable - -
Manjaro Stable
community
puppet5 5.5.19 Potentially vulnerable - -
Manjaro Testing
community
puppet 6.14.0 Potentially vulnerable - -
Manjaro Testing
community
puppet5 5.5.19 Potentially vulnerable - -
Manjaro Unstable
community
puppet 6.14.0 Potentially vulnerable - -
Manjaro Unstable
community
puppet5 5.5.19 Potentially vulnerable - -
OpenBSD Ports sysutils/ruby-puppet/6 6.15.0 Potentially vulnerable sysutils sebastia@openbsd.org
OpenBSD Ports sysutils/ruby-puppet/5 5.5.19 Potentially vulnerable sysutils sebastia@openbsd.org
OpenIndiana packages
hipster
puppet 3.8.6 Potentially vulnerable System/Administration and Configuration -
OpenIndiana packages
hipster
puppet 3.8.6 Potentially vulnerable System/Administration and Configuration -
Parabola
community
puppet 6.14.0 Potentially vulnerable - -
Parabola
community
puppet5 5.5.19 Potentially vulnerable - -
Pardus
main
puppet 4.8.2 Potentially vulnerable admin pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Parrot
main
puppet 5.5.19 Potentially vulnerable admin pkg-puppet-devel@alioth-lists.debian.net, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
PLD Linux puppet 3.7.5 Potentially vulnerable - -
PureOS Amber puppet 5.5.10 Potentially vulnerable misc pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
PureOS landing puppet 5.5.19 Potentially vulnerable misc pkg-puppet-devel@alioth-lists.debian.net, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
PureOS landing puppet 5.5.10 Potentially vulnerable misc pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
Raspbian Oldstable
main
puppet 4.8.2 Potentially vulnerable admin pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Raspbian Stable
main
puppet 5.5.10 Potentially vulnerable admin pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
Raspbian Testing
main
puppet 5.5.19 Potentially vulnerable admin pkg-puppet-devel@alioth-lists.debian.net, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
Ravenports puppet 6.15.0 Potentially vulnerable sysutils fallback-mnt-ravenports@repology
Rosa 2014.1
contrib/updates
puppet 4.2.1 Potentially vulnerable - -
Rosa 2014.1
main/release
puppet 3.3.0 Potentially vulnerable - -
Rosa 2016.1
contrib/updates
puppet 5.5.1 Potentially vulnerable - -
Rosa 2016.1
contrib/release
puppet 4.2.1 Potentially vulnerable - -
Rosa Server 6.9
extra/release
puppet 2.7.26 Potentially vulnerable System Environment/Base andrew.lukoshko@rosalab.ru
Rosa Server 6.9
contrib/release
puppet 2.6.17 Potentially vulnerable System Environment/Base fallback-mnt-rosa@repology
Rosa Server 7.3
extra/release
puppet 3.6.2 Potentially vulnerable Unspecified alex2048@mail.ru
Rosa Server 7.5
extra/release
puppet 3.6.2 Potentially vulnerable Unspecified alex2048@mail.ru
SliTaz Cooking puppet 2.7.19 Potentially vulnerable system-tools pankso@slitaz.org
Trisquel 6.0
toutatis/main
puppet 2.7.11 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Trisquel 6.0
toutatis-updates/main
puppet 2.7.11 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Trisquel 7.0
belenos/main
puppet 3.4.3 Potentially vulnerable admin pkg-puppet-devel@lists.alioth.debian.org, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Trisquel 7.0
belenos-updates/main
puppet 3.4.3 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Trisquel 8.0
flidas/main
puppet 3.8.5 Potentially vulnerable universe/admin pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Trisquel 8.0
flidas-updates/main
puppet 3.8.5 Potentially vulnerable universe/admin ubuntu-devel-discuss@lists.ubuntu.com, apoikos@debian.org, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Ubuntu 12.04
precise/main
puppet 2.7.11 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Ubuntu 12.04
precise-updates/main
puppet 2.7.11 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Ubuntu 14.04
trusty/main
puppet 3.4.3 Potentially vulnerable admin pkg-puppet-devel@lists.alioth.debian.org, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Ubuntu 14.04
trusty-updates/main
puppet 3.4.3 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Ubuntu 16.04
xenial/universe
puppet 3.8.5 Potentially vulnerable universe/admin pkg-puppet-devel@lists.alioth.debian.org, apoikos@debian.org, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Ubuntu 16.04
xenial-updates/universe
puppet 3.8.5 Potentially vulnerable universe/admin ubuntu-devel-discuss@lists.ubuntu.com, apoikos@debian.org, apollock@debian.org, micah@debian.org, nigel@explanatorygap.net, ssm@debian.org
Ubuntu 18.04
bionic/universe
puppet 5.4.0 Potentially vulnerable universe/admin ubuntu-devel-discuss@lists.ubuntu.com, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
Ubuntu 19.10
eoan/universe
puppet 5.4.0 Potentially vulnerable universe/admin ubuntu-devel-discuss@lists.ubuntu.com, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
Ubuntu 20.04
focal/universe
puppet 5.5.10 Potentially vulnerable universe/admin ubuntu-devel-discuss@lists.ubuntu.com, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
Ubuntu 20.10
groovy/universe
puppet 5.5.10 Potentially vulnerable universe/admin ubuntu-devel-discuss@lists.ubuntu.com, apoikos@debian.org, apollock@debian.org, micah@debian.org, ssm@debian.org
Void Linux x86_64
x86_64
puppet 6.11.1 Potentially vulnerable - orphan@voidlinux.org
Wikidata Puppet 6.15.0 Potentially vulnerable - -

Absent in repositories

  • Adélie Linux current
  • AIX Open Source Packages
  • Alpine Linux 3.8
  • Alpine Linux 3.9
  • Alpine Linux 3.10
  • Alpine Linux 3.11
  • Alpine Linux Edge
  • Amazon Linux 2
  • antiX-16
  • antiX-17
  • antiX-19
  • AOSC
  • Arch Testing
  • Ataraxia Linux
  • BlackArch
  • BlackBox 6
  • BlackBox 7
  • Buckaroo
  • BunsenLabs Hydrogen
  • BunsenLabs Hydrogen/Jessie Backports
  • BunsenLabs Helium
  • BunsenLabs Helium/Stretch Backports
  • Calculate
  • Carbs Linux
  • CentOS 6
  • CentOS 7
  • CentOS 8
  • Chakra
  • Chakra Staging
  • Chakra Testing
  • ConanCenter
  • CPAN
  • MetaCPAN
  • CRAN
  • crates.io
  • CRUX 3.2
  • CRUX 3.3
  • CRUX 3.4
  • CRUX 3.5
  • Cygwin
  • Deb Multimedia Unstable
  • Debian Stable Backports
  • Debian Experimental
  • distri
  • DistroWatch.com
  • ELRepo el7
  • ELRepo el7 Testing
  • Entware
  • EPEL 6
  • EPEL 8
  • F-Droid
  • freshcode.club
  • Gentoo overlay GURU
  • Gentoo overlay Pentoo
  • GNU Elpa
  • GNU Guix
  • GoboLinux
  • Hackage
  • HaikuPorts master
  • Homebrew
  • Homebrew Casks
  • Homebrew tap Brewsci/bio
  • HP-UX 11.31
  • just-install
  • KaOS
  • KaOS Build
  • KDE neon Dev Stable
  • KDE neon Dev Unstable
  • KDE neon Experimental
  • KDE neon User
  • KDE neon User LTS
  • KISS Linux Community
  • KISS Linux Main
  • Kwort 4.3.2
  • Kwort 4.3.3
  • Kwort 4.3.4
  • Libregamewiki
  • Linux Mint 17
  • Linux Mint 17.1
  • Linux Mint 17.2
  • Linux Mint 17.3
  • Linux Mint 18
  • Linux Mint 18.1
  • Linux Mint 18.2
  • Linux Mint 18.3
  • Linux Mint 19
  • Linux Mint 19.1
  • Linux Mint 19.2
  • Linux Mint 19.3
  • Linuxbrew
  • LuaRocks
  • Maemo Fremantle
  • MELPA
  • MSYS2 mingw
  • MSYS2 msys2
  • MX Linux MX-15
  • MX Linux MX-15 Testing
  • MX Linux MX-16
  • MX Linux MX-17
  • MX Linux MX-17 Testing
  • MX Linux MX-19
  • MX Linux MX-19 Testing
  • NeuroDebian data
  • NeuroDebian Debian 8
  • NeuroDebian Debian 9
  • NeuroDebian Debian 10
  • NeuroDebian Debian Unstable
  • NeuroDebian Ubuntu 14.04
  • NeuroDebian Ubuntu 16.04
  • NeuroDebian Ubuntu 18.04
  • NeuroDebian Ubuntu 19.04
  • nixpkgs stable
  • nixpkgs unstable
  • Npackd Stable
  • Npackd Stable64
  • Npackd Unstable
  • openEuler 20.03
  • OpenMandriva 3.0
  • OpenMandriva 4.0
  • OpenMandriva 4.1
  • OpenMandriva Rolling
  • OpenMandriva Cooker
  • OpenPKG
  • openSUSE Leap 42.3
  • openSUSE Leap 15.0
  • openSUSE Leap 15.1
  • openSUSE Leap 15.2
  • openSUSE Tumbleweed
  • openSUSE Education Tumbleweed
  • openSUSE Emulators Tumbleweed
  • openSUSE Games Tumbleweed
  • openSUSE Graphics Tumbleweed
  • openSUSE Hardware:SDR Tumbleweed
  • openSUSE Multimedia:Apps Tumbleweed
  • openSUSE Multimedia:Libs Tumbleweed
  • openSUSE Network Tumbleweed
  • openSUSE Science Tumbleweed
  • openSUSE Security Tumbleweed
  • OpenWrt 17.01 x86_64
  • OpenWrt 18.06 x86_64
  • OpenWrt 19.07 x86_64
  • OS4Depot
  • PackMan openSUSE Leap 42.3
  • PackMan openSUSE Leap 15.0
  • PackMan openSUSE Leap 15.1
  • PackMan openSUSE Leap 15.2
  • PackMan openSUSE Tumbleweed
  • PackMan SLE 12
  • PackMan SLE 15
  • Parabola Testing
  • PCLinuxOS
  • Pisi Linux
  • Pisi Linux Contrib
  • pkgsrc current
  • ReactOS rapps
  • Rosa 2019.0
  • Rosa 2019.1
  • RPM Fusion EL 6
  • RPM Fusion EL 7
  • RPM Fusion EL 8
  • RPM Fusion Fedora 28
  • RPM Fusion Fedora 29
  • RPM Fusion Fedora 30
  • RPM Fusion Fedora 31
  • RPM Fusion Fedora Rawhide
  • RPM Sphere
  • RubyGems
  • Sabayon
  • Sabayon for-gentoo
  • Salix 14.2
  • Scientific Linux 7.x
  • Scoop
  • Siduction
  • Siduction Experimental
  • SlackBuilds
  • Slackware 14.2
  • Slackware current
  • Slackware64 14.2
  • Slackware64 current
  • Slackwarearm 14.2
  • Slackwarearm current
  • SliTaz Next
  • Solus
  • Sparky Stable
  • Sparky Testing
  • Stackage LTS Haskell
  • Stackage Nightly
  • T2 SDE
  • Tails stable
  • Tails devel
  • Termux
  • Trisquel 6.0 backports
  • Trisquel 7.0 backports
  • Trisquel 8.0 backports
  • Ubuntu 12.04 Backports
  • Ubuntu 14.04 Backports
  • Ubuntu 16.04 Backports
  • Ubuntu 18.04 Backports
  • Ubuntu 19.10 Backports
  • Ubuntu 19.10 Proposed
  • Ubuntu 20.04 Proposed
  • Ubuntu 20.10 Proposed
  • UnitedRPMs Fedora 30
  • UnitedRPMs Fedora 31
  • UnitedRPMs Fedora 32
  • UnitedRPMs Fedora 33
  • Vcpkg
  • Whonix
  • Whonix Developers
  • winget
  • YACP