Versions Packages Information History CVEs Related Badges Report

Versions for dropbear

232 package(s) known

Repository Package name Version Category Maintainer(s)
Alpine Linux 3.8
main
dropbear-scp 2018.76 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
dropbear-openrc 2018.76 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
dropbear-convert 2018.76 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
dropbear-ssh 2018.76 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
dropbear 2018.76 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
dropbear-doc 2018.76 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
dropbear-dbclient 2018.76 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
dropbear-doc 2018.76 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
dropbear 2018.76 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
dropbear-scp 2018.76 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
dropbear-dbclient 2018.76 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
dropbear-ssh 2018.76 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
dropbear-convert 2018.76 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
dropbear-openrc 2018.76 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
dropbear-openrc 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
dropbear-doc 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
dropbear-scp 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
dropbear-dbclient 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
dropbear-ssh 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
dropbear-convert 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
dropbear 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
dropbear-scp 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
dropbear-doc 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
dropbear 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
dropbear-ssh 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
dropbear-convert 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
dropbear-openrc 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
dropbear-dbclient 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
dropbear-dbclient 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
dropbear-ssh 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
dropbear-convert 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
dropbear 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
dropbear-doc 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
dropbear-scp 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
dropbear-openrc 2019.78 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
dropbear-doc 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
dropbear 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
dropbear-convert 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
dropbear-ssh 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
dropbear-openrc 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
dropbear-dbclient 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
dropbear-scp 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
dropbear-doc 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
dropbear-ssh 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
dropbear 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
dropbear-openrc 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
dropbear-scp 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
dropbear-convert 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
dropbear-dbclient 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
dropbear 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
dropbear-ssh 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
dropbear-doc 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
dropbear-openrc 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
dropbear-scp 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
dropbear-convert 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
dropbear-dbclient 2020.81 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
dropbear-scp 2022.82 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
dropbear-ssh 2022.82 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
dropbear 2022.82 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
dropbear-doc 2022.82 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
dropbear-openrc 2022.82 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
dropbear-convert 2022.82 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
dropbear-dbclient 2022.82 - ncopa@alpinelinux.org
Alpine Linux 3.17
main
dropbear-scp 2022.83 - ncopa@alpinelinux.org
Alpine Linux 3.17
main
dropbear-doc 2022.83 - ncopa@alpinelinux.org
Alpine Linux 3.17
main
dropbear-convert 2022.83 - ncopa@alpinelinux.org
Alpine Linux 3.17
main
dropbear 2022.83 - ncopa@alpinelinux.org
Alpine Linux 3.17
main
dropbear-openrc 2022.83 - ncopa@alpinelinux.org
Alpine Linux 3.17
main
dropbear-dbclient 2022.83 - ncopa@alpinelinux.org
Alpine Linux 3.17
main
dropbear-ssh 2022.83 - ncopa@alpinelinux.org
Alpine Linux 3.18
main
dropbear 2022.83 - ncopa@alpinelinux.org
Alpine Linux 3.18
main
dropbear-convert 2022.83 - ncopa@alpinelinux.org
Alpine Linux 3.18
main
dropbear-dbclient 2022.83 - ncopa@alpinelinux.org
Alpine Linux 3.18
main
dropbear-doc 2022.83 - ncopa@alpinelinux.org
Alpine Linux 3.18
main
dropbear-openrc 2022.83 - ncopa@alpinelinux.org
Alpine Linux 3.18
main
dropbear-scp 2022.83 - ncopa@alpinelinux.org
Alpine Linux 3.18
main
dropbear-ssh 2022.83 - ncopa@alpinelinux.org
Alpine Linux Edge
main
dropbear 2022.83 - ncopa@alpinelinux.org
Alpine Linux Edge
main
dropbear-convert 2022.83 - ncopa@alpinelinux.org
Alpine Linux Edge
main
dropbear-dbclient 2022.83 - ncopa@alpinelinux.org
Alpine Linux Edge
main
dropbear-doc 2022.83 - ncopa@alpinelinux.org
Alpine Linux Edge
main
dropbear-openrc 2022.83 - ncopa@alpinelinux.org
Alpine Linux Edge
main
dropbear-scp 2022.83 - ncopa@alpinelinux.org
Alpine Linux Edge
main
dropbear-ssh 2022.83 - ncopa@alpinelinux.org
ALT Linux p9 dropbear 2017.75 Potentially vulnerable System/Servers darktemplar@altlinux.org
ALT Linux p10 dropbear 2017.75 Potentially vulnerable System/Servers darktemplar@altlinux.org
ALT Sisyphus dropbear 2022.82 System/Servers vt@altlinux.org
Arch
extra
dropbear 2022.83 - -
Arch
extra
dropbear-scp 2022.83 - -
Arch Linux 32 i486
extra
dropbear-scp 2022.83 - -
Arch Linux 32 i486
extra
dropbear 2022.83 - -
Arch Linux 32 i686
extra
dropbear 2022.83 - -
Arch Linux 32 i686
extra
dropbear-scp 2022.83 - -
Arch Linux 32 pentium4
extra
dropbear-scp 2022.83 - -
Arch Linux 32 pentium4
extra
dropbear 2022.83 - -
Arch Linux ARM aarch64
extra
dropbear 2022.83 - -
Arch Linux ARM aarch64
extra
dropbear-scp 2022.83 - -
Arch Linux ARM aarch64
community
dropbear-scp 2022.83 - -
Arch Linux ARM aarch64
community
dropbear 2022.83 - -
AUR dropbear-git 2022.83.r41.g5040f21 - chocobo1@aur
Artix
world
dropbear 2022.83 - -
Artix
world
dropbear-scp 2022.83 - -
Ataraxia GNU/Linux dropbear 2020.81 Potentially vulnerable net nagakamira@gmail.com
Buildroot 2023.02.x dropbear 2022.83 - -
Buildroot 2023.05.x dropbear 2022.83 - -
Buildroot master dropbear 2022.83 - -
Carbs Linux
extra
dropbear 2022.83 - cem@carbslinux.org
CRUX 3.4
opt
dropbear 2019.78 Potentially vulnerable - jue@crux.nu
CRUX 3.5
opt
dropbear 2020.81 Potentially vulnerable - jue@crux.nu
CRUX 3.6
opt
dropbear 2022.82 - jue@crux.nu
CRUX 3.7
opt
dropbear 2022.83 - jue@crux.nu
Debian 10
buster/main
dropbear 2018.76 Potentially vulnerable net guilhem@debian.org, pape@smarden.org
Debian 10
buster/updates/main
dropbear 2018.76 Potentially vulnerable net guilhem@debian.org, pape@smarden.org
Debian 11
bullseye/main
dropbear 2020.81 Potentially vulnerable net guilhem@debian.org, pape@smarden.org
Debian 11 Backports
bullseye-backports/main
dropbear 2022.83 misc guilhem@debian.org
Debian 12
bookworm/main
dropbear 2022.83 net guilhem@debian.org
Debian 13
trixie/main
dropbear 2022.83 net guilhem@debian.org
Debian Unstable
sid/main
dropbear 2022.83 net guilhem@debian.org
Deepin
main
dropbear 2018.76 Potentially vulnerable - guilhem@debian.org, pape@smarden.org
Devuan 3.0
beowulf/main
dropbear 2018.76 Potentially vulnerable net guilhem@debian.org, pape@smarden.org
Devuan 4.0
chimaera/main
dropbear 2020.81 Potentially vulnerable net guilhem@debian.org, pape@smarden.org
Devuan Unstable
unstable/main
dropbear 2022.83 net guilhem@debian.org
Entware
mipselsf-k3.4
dropbear 2022.82 net fallback-mnt-entware@repology
Entware
mipselsf-k3.4
dropbearconvert 2022.82 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
dropbear 2022.82 net fallback-mnt-entware@repology
Entware
mipssf-k3.4
dropbearconvert 2022.82 utils fallback-mnt-entware@repology
Entware
x64-k3.2
dropbear 2022.82 net fallback-mnt-entware@repology
Entware
x64-k3.2
dropbearconvert 2022.82 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
dropbear 2022.82 net fallback-mnt-entware@repology
Entware
aarch64-k3.10
dropbearconvert 2022.82 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
dropbear 2022.82 net fallback-mnt-entware@repology
Entware
armv5sf-k3.2
dropbearconvert 2022.82 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
dropbear 2022.82 net fallback-mnt-entware@repology
Entware
armv7sf-k2.6
dropbearconvert 2022.82 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
dropbear 2022.82 net fallback-mnt-entware@repology
Entware
armv7sf-k3.2
dropbearconvert 2022.82 utils fallback-mnt-entware@repology
EPEL 6 dropbear 2017.75 Potentially vulnerable Applications/Internet -
EPEL 7 dropbear 2017.75 Potentially vulnerable Unspecified -
EPEL 8 dropbear 2019.78 Potentially vulnerable Unspecified -
EPEL 9 dropbear 2020.80 Potentially vulnerable Unspecified -
Exherbo
tombriden
net/dropbear 2020.81 Potentially vulnerable net fallback-mnt-exherbo@repology
Fedora 26
release
dropbear 2017.75 Potentially vulnerable Unspecified -
Fedora 27
release
dropbear 2017.75 Potentially vulnerable Unspecified -
Fedora 27
updates
dropbear 2017.75 Potentially vulnerable Unspecified -
Fedora 28
release
dropbear 2018.76 Potentially vulnerable Unspecified -
Fedora 28
updates
dropbear 2018.76 Potentially vulnerable Unspecified -
Fedora 29
release
dropbear 2018.76 Potentially vulnerable Unspecified -
Fedora 30
release
dropbear 2019.78 Potentially vulnerable Unspecified -
Fedora 31
release
dropbear 2019.78 Potentially vulnerable Unspecified -
Fedora 32
release
dropbear 2019.78 Potentially vulnerable Unspecified -
Fedora 33
release
dropbear 2020.80 Potentially vulnerable Unspecified -
Fedora 34
release
dropbear 2020.80 Potentially vulnerable Unspecified -
Fedora 35
release
dropbear 2020.80 Potentially vulnerable Unspecified -
Fedora 36
release
dropbear 2020.80 Potentially vulnerable Unspecified -
Fedora 37
release
dropbear 2020.80 Potentially vulnerable Unspecified -
Fedora 38
release
dropbear 2022.82 Unspecified -
Fedora 39
development
dropbear 2022.82 Unspecified -
Fedora Rawhide
development
dropbear 2022.82 Unspecified -
FreeBSD Ports security/dropbear 2022.83 security pkubaj@freebsd.org
Gentoo net-misc/dropbear 2022.83 net-misc embedded@gentoo.org
GNU Guix dropbear 2022.83 - -
GoboLinux Dropbear 0.49 Potentially vulnerable - -
Homebrew dropbear HEAD - -
Homebrew dropbear 2022.83 - -
Kali Linux Rolling
main
dropbear 2022.83 net guilhem@debian.org
LiGurOS stable net-misc/dropbear 2022.83 net-misc embedded@gentoo.org
LiGurOS develop net-misc/dropbear 2022.83 net-misc embedded@gentoo.org
Mageia 8
core/updates
dropbear 2020.81 Potentially vulnerable Networking/Remote access -
Mageia 8
core/release
dropbear 2020.81 Potentially vulnerable Networking/Remote access -
Mageia cauldron
core/release
dropbear 2022.83 Networking/Remote access -
Manjaro Stable
extra
dropbear-scp 2022.83 - -
Manjaro Stable
extra
dropbear 2022.83 - -
Manjaro Testing
extra
dropbear 2022.83 - -
Manjaro Testing
extra
dropbear-scp 2022.83 - -
Manjaro Unstable
extra
dropbear 2022.83 - -
Manjaro Unstable
extra
dropbear-scp 2022.83 - -
nixpkgs stable 21.11 dropbear 2020.81 Potentially vulnerable - ab@fmap.me
nixpkgs stable 22.05 dropbear 2020.81 Potentially vulnerable - ab@fmap.me
nixpkgs stable 22.11 dropbear 2022.82 - ab@fmap.me
nixpkgs stable 23.05 dropbear 2022.83 - ab@fmap.me
nixpkgs unstable dropbear 2022.83 - ab@fmap.me
OpenMandriva 4.0
main/release
dropbear 2018.76 Potentially vulnerable Networking/Remote access bero@lindev.ch
OpenMandriva 4.1
main/release
dropbear 2019.78 Potentially vulnerable Networking/Remote access nobodydead@gmail.com
OpenMandriva 4.2
main/release
dropbear 2020.81 Potentially vulnerable Networking/Remote access bero@lindev.ch
OpenMandriva 4.3
main/release
dropbear 2020.81 Potentially vulnerable Networking/Remote access bero+massbuild@lindev.ch
OpenMandriva Rolling
main/release
dropbear 2022.83 Networking/Remote access bero@lindev.ch
OpenMandriva Cooker
main/release
dropbear 2022.83 Networking/Remote access bero@lindev.ch
openSUSE network Tumbleweed dropbear 2022.83 Productivity/Networking/SSH -
OpenWrt 17.01 x86_64
base
dropbear 2017.75 Potentially vulnerable net fallback-mnt-openwrt@repology
OpenWrt 17.01 x86_64
base
dropbearconvert 2017.75 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
dropbear 2017.75 Potentially vulnerable net fallback-mnt-openwrt@repology
OpenWrt 18.06 x86_64
base
dropbearconvert 2017.75 Potentially vulnerable utils fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
dropbear 2019.78 Potentially vulnerable net fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
base
dropbearconvert 2019.78 Potentially vulnerable utils fallback-mnt-openwrt@repology
Parabola
extra
dropbear-scp 2022.83 - -
Parabola
extra
dropbear 2022.83 - -
Pardus 21
main
dropbear 2020.81 Potentially vulnerable net guilhem@debian.org, pape@smarden.org
Parrot
parrot-updates/main
dropbear 2020.81 Potentially vulnerable net guilhem@debian.org, pape@smarden.org
Parrot
parrot/main
dropbear 2020.81 Potentially vulnerable net guilhem@debian.org, pape@smarden.org
pkgsrc current security/dropbear 2020.81 Potentially vulnerable security snj@netbsd.org
PLD Linux dropbear 2018.76 Potentially vulnerable - -
PureOS Amber dropbear 2018.76 Potentially vulnerable oldlibs guilhem@debian.org, pape@smarden.org
PureOS landing dropbear 2022.83 net guilhem@debian.org
Raspbian Oldstable
main
dropbear 2020.81 Potentially vulnerable net guilhem@debian.org, pape@smarden.org
Raspbian Stable
main
dropbear 2022.83 net guilhem@debian.org
Raspbian Testing
main
dropbear 2022.83 net guilhem@debian.org
Rosa 2014.1
main/updates
dropbear 2016.74 Potentially vulnerable - -
Rosa 2014.1
main/release
dropbear 2014.65 Potentially vulnerable - -
Rosa 2016.1
main/updates
dropbear 2018.76 Potentially vulnerable - -
Rosa 2016.1
main/release
dropbear 2016.74 Potentially vulnerable - -
Rosa 2021.1
contrib/release
dropbear 2022.82 Networking/Remote access alexander@mezon.ru
SlackBuilds network/dropbear 2022.83 network andrew.clemons@gmail.com
SliTaz Cooking dropbear 2022.83 security pascal.bellard@slitaz.org
SliTaz Cooking dropbear-pam 2022.83 security pascal.bellard@slitaz.org
SliTaz Next dropbear 2018.76 Potentially vulnerable security pascal.bellard@slitaz.org
SliTaz Next dropbear-pam 2018.76 Potentially vulnerable security pascal.bellard@slitaz.org
SliTaz Next dropbear 2018.76 Potentially vulnerable security pascal.bellard@slitaz.org
T2 SDE dropbear 2022.83 base/system extra/network rene@t2-project.org
Termux dropbear 2022.83 - termux@github
Trisquel 10.0
nabia/main
dropbear 2019.78 Potentially vulnerable universe/net guilhem@debian.org, pape@smarden.org
Trisquel 11.0
aramo/main
dropbear 2020.81 Potentially vulnerable universe/net guilhem@debian.org
Ubuntu 14.04
trusty-updates/universe
dropbear 2013.60 Potentially vulnerable universe/net ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty/universe
dropbear 2013.60 Potentially vulnerable universe/net ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial/universe
dropbear 2016.72 Potentially vulnerable universe/net guilhem@guilhem.org, pape@smarden.org
Ubuntu 18.04
bionic/universe
dropbear 2017.75 Potentially vulnerable universe/net guilhem@debian.org, pape@smarden.org
Ubuntu 20.04
focal/universe
dropbear 2019.78 Potentially vulnerable universe/net guilhem@debian.org, pape@smarden.org
Ubuntu 22.04
jammy/universe
dropbear 2020.81 Potentially vulnerable universe/net guilhem@debian.org
Ubuntu 23.04
lunar/universe
dropbear 2022.83 universe/net guilhem@debian.org
Ubuntu 23.10
mantic/universe
dropbear 2022.83 universe/net guilhem@debian.org
Void Linux x86_64
x86_64
dropbear 2022.83 - orphan@voidlinux.org
Wikidata Dropbear 2022.83 - -
YACP dropbear 2018.76 Potentially vulnerable Security -