Versions Packages Information History CVEs Related Badges Report

Packages for sudo

509 package(s) known

sudo

1.9.10 Potentially vulnerable (1.9.10-r0)

sudo-dbg

1.9.10 Potentially vulnerable (1.9.10-r0)

sudo-dev

1.9.10 Potentially vulnerable (1.9.10-r0)

sudo-doc

1.9.10 Potentially vulnerable (1.9.10-r0)

sudo-lang

1.9.10 Potentially vulnerable (1.9.10-r0)

sudo

1.9.2 Potentially vulnerable (1.9.2-1)

sudo

1.9.1 Potentially vulnerable (1.9.1-1)

sudo

1.9.0 Potentially vulnerable (1.9.0-1)

sudo

1.8.31p2 Potentially vulnerable (1.8.31p2-1)

sudo

1.8.31p1 Potentially vulnerable (1.8.31p1-1)

sudo

1.8.31 Potentially vulnerable (1.8.31-1)

sudo

1.8.30 Potentially vulnerable (1.8.30-1)

sudo

1.8.29 Potentially vulnerable (1.8.29-1)

sudo

1.8.28p1 Potentially vulnerable (1.8.28p1-1)

sudo

1.8.28 Potentially vulnerable (1.8.28-1)

sudo

1.8.27 Potentially vulnerable (1.8.27-1)

sudo

1.8.26 Potentially vulnerable (1.8.26-1)

sudo

1.8.25p1 Potentially vulnerable (1.8.25p1-1)

sudo

1.8.25 Potentially vulnerable (1.8.25-1)

sudo

1.8.24 Potentially vulnerable (1.8.24-1)

sudo

1.8.23 Potentially vulnerable (1.8.23-1)

sudo

1.8.22 Potentially vulnerable (1.8.22-1)

sudo

1.8.21p2 Potentially vulnerable (1.8.21p2-1)

sudo

1.8.21p1 Potentially vulnerable (1.8.21p1-1)

sudo

1.8.21 Potentially vulnerable (1.8.21-1)

sudo

1.8.20p2 Potentially vulnerable (1.8.20p2-1)

sudo

1.8.20p1 Potentially vulnerable (1.8.20p1-1)

sudo

1.8.20 Potentially vulnerable (1.8.20-1)

sudo

1.8.19p2 Potentially vulnerable (1.8.19p2-1)

sudo

1.8.19p1 Potentially vulnerable (1.8.19p1-1)

sudo

1.8.19 Potentially vulnerable (1.8.19-1)

sudo

1.8.18p1 Potentially vulnerable (1.8.18p1-1)

sudo

1.8.18p1 Potentially vulnerable (1.8.18p1-2)

sudo

1.8.18 Potentially vulnerable (1.8.18-1)

sudo

1.8.17p1 Potentially vulnerable (1.8.17p1-1)

sudo

1.8.17 Potentially vulnerable (1.8.17-1)

sudo

1.8.16 Potentially vulnerable (1.8.16-1)

sudo

1.8.15 Potentially vulnerable (1.8.15-1)

sudo

1.8.15 Potentially vulnerable (1.8.15-2)

sudo

1.8.14p3 Potentially vulnerable (1.8.14p3-1)

sudo

1.8.14p2 Potentially vulnerable (1.8.14p2-1)

sudo

1.8.14p1 Potentially vulnerable (1.8.14p1-1)

sudo

1.8.14 Potentially vulnerable (1.8.14-1)

sudo

1.8.13 Potentially vulnerable (1.8.13-1)

sudo

1.8.12 Potentially vulnerable (1.8.12-1)

sudo

1.8.11p2 Potentially vulnerable (1.8.11p2-1)

sudo

1.8.11p1 Potentially vulnerable (1.8.11p1-1)

sudo

1.8.11p1 Potentially vulnerable (1.8.11p1-2)

sudo

1.8.11 Potentially vulnerable (1.8.11-1)

sudo

1.8.11 Potentially vulnerable (1.8.11-2)

sudo

1.8.10p3 Potentially vulnerable (1.8.10p3-1)

sudo

1.8.10p3 Potentially vulnerable (1.8.10p3-2)

sudo

1.8.10p2 Potentially vulnerable (1.8.10p2-1)

sudo

1.8.10p1 Potentially vulnerable (1.8.10p1-1)

sudo

1.8.10 Potentially vulnerable (1.8.10-1)

sudo

1.8.9p5 Potentially vulnerable (1.8.9p5-1)

sudo

1.8.9p5 Potentially vulnerable (1.8.9p5-2)

sudo

1.8.9p4 Potentially vulnerable (1.8.9p4-1)

sudo

1.8.9p3 Potentially vulnerable (1.8.9p3-1)

sudo

1.8.9p2 Potentially vulnerable (1.8.9p2-1)

sudo

1.8.9p1 Potentially vulnerable (1.8.9p1-1)

sudo

1.8.9 Potentially vulnerable (1.8.9-1)

sudo

1.8.8 Potentially vulnerable (1.8.8-1)

sudo

1.8.7 Potentially vulnerable (1.8.7-1)

sudo

1.8.7 Potentially vulnerable (1.8.7-2)

sudo

1.8.6p8 Potentially vulnerable (1.8.6p8-1)

sudo

1.8.6p8 Potentially vulnerable (1.8.6p8-2)

sudo

1.8.6p7 Potentially vulnerable (1.8.6p7-1)

sudo

1.8.6p6 Potentially vulnerable (1.8.6p6-1)

sudo

1.8.6p5 Potentially vulnerable (1.8.6p5-1)

sudo

1.8.6p4 Potentially vulnerable (1.8.6p4-1)

sudo

1.8.6p3 Potentially vulnerable (1.8.6p3-1)

sudo

1.8.6p2 Potentially vulnerable (1.8.6p2-1)

sudo

1.8.6p1 Potentially vulnerable (1.8.6p1-1)

sudo

1.8.6 Potentially vulnerable (1.8.6-1)

sudo

1.8.5p3 Potentially vulnerable (1.8.5p3-1)

sudo

1.8.5p2 Potentially vulnerable (1.8.5p2-1)

sudo

1.8.5p1 Potentially vulnerable (1.8.5p1-1)

sudo

1.8.4p5 Potentially vulnerable (1.8.4p5-1)

sudo

1.8.4p4 Potentially vulnerable (1.8.4p4-1)

sudo

1.8.4p2 Potentially vulnerable (1.8.4p2-1)

sudo

1.8.4p1 Potentially vulnerable (1.8.4p1-1)

sudo

1.8.3p2 Potentially vulnerable (1.8.3p2-1)

sudo

1.8.3p1 Potentially vulnerable (1.8.3p1-1)

sudo

1.8.3 Potentially vulnerable (1.8.3-1)

sudo

1.8.2 Potentially vulnerable (1.8.2-1)

sudo

1.8.1p2 Potentially vulnerable (1.8.1p2-1)

sudo

1.8.1p1 Potentially vulnerable (1.8.1p1-1)

sudo

1.8.1 Potentially vulnerable (1.8.1-1)

sudo

1.8.0 Potentially vulnerable (1.8.0-2)

sudo

1.7.10p9 Potentially vulnerable (1.7.10p9-1)

sudo

1.7.10p8 Potentially vulnerable (1.7.10p8-1)

sudo

1.7.10p7 Potentially vulnerable (1.7.10p7-1)

sudo

1.7.10p6 Potentially vulnerable (1.7.10p6-1)

sudo

1.7.10p5 Potentially vulnerable (1.7.10p5-1)

sudo

1.7.10p4 Potentially vulnerable (1.7.10p4-1)

sudo

1.7.10p3 Potentially vulnerable (1.7.10p3-1)

sudo

1.7.10p2 Potentially vulnerable (1.7.10p2-1)

sudo

1.7.10p1 Potentially vulnerable (1.7.10p1-1)

sudo

1.7.10 Potentially vulnerable (1.7.10-1)

sudo

1.7.9p1 Potentially vulnerable (1.7.9p1-1)

sudo

1.7.9 Potentially vulnerable (1.7.9-1)

sudo

1.7.8p2 Potentially vulnerable (1.7.8p2-1)

sudo

1.7.8p1 Potentially vulnerable (1.7.8p1-1)

sudo

1.7.8 Potentially vulnerable (1.7.8-1)

sudo

1.7.7 Potentially vulnerable (1.7.7-1)

sudo

1.7.6p2 Potentially vulnerable (1.7.6p2-1)

sudo

1.7.6p1 Potentially vulnerable (1.7.6p1-1)

sudo

1.7.6 Potentially vulnerable (1.7.6-1)

sudo

1.7.5 Potentially vulnerable (1.7.5-1)

sudo

1.7.4p6 Potentially vulnerable (1.7.4p6-1)

sudo

1.7.4p5 Potentially vulnerable (1.7.4p5-1)

sudo

1.7.4p4 Potentially vulnerable (1.7.4p4-1)

sudo

1.7.4p2 Potentially vulnerable (1.7.4p2-1)

sudo

1.7.4 Potentially vulnerable (1.7.4-1)

sudo

1.7.3 Potentially vulnerable (1.7.3-1)

sudo

1.7.2p8 Potentially vulnerable (1.7.2p8-1)

sudo

1.7.2p7 Potentially vulnerable (1.7.2p7-1)

sudo

1.7.2p5 Potentially vulnerable (1.7.2p5-1)

sudo

1.7.2p4 Potentially vulnerable (1.7.2p4-1)

sudo

1.7.2p3 Potentially vulnerable (1.7.2p3-1)

sudo

1.7.2p2 Potentially vulnerable (1.7.2p2-1)

sudo

1.7.2p1 Potentially vulnerable (1.7.2p1-1)

sudo

1.7.2 Potentially vulnerable (1.7.2-1)

sudo

1.7.1 Potentially vulnerable (1.7.1-1)

sudo

1.7.0 Potentially vulnerable (1.7.0-1)

sudo

1.7.0rc5 Potentially vulnerable (1.7.0rc5-1)

sudo

1.7.0rc2 Potentially vulnerable (1.7.0rc2-1)

sudo

1.7b4 Potentially vulnerable (1.7b4-1)

sudo

1.6.9p23 Potentially vulnerable (1.6.9p23-1)

sudo

1.6.9p20 Potentially vulnerable (1.6.9p20-1)

sudo

1.6.9p18 Potentially vulnerable (1.6.9p18-1)

sudo

1.6.9p17 Potentially vulnerable (1.6.9p17-1)

sudo

1.6.9p16 Potentially vulnerable (1.6.9p16-1)

sudo

1.6.9p15 Potentially vulnerable (1.6.9p15-1)

sudo

1.6.9p14 Potentially vulnerable (1.6.9p14-1)

sudo

1.9.13p2 Potentially vulnerable (1.9.13p2-1)

sudo

1.8.29 Potentially vulnerable (1.8.29-10.el8)

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-9.el9)

sudo

1.8.23 Potentially vulnerable (1.8.23-r4)

sudo-dev

1.8.23 Potentially vulnerable (1.8.23-r4)

sudo-doc

1.8.23 Potentially vulnerable (1.8.23-r4)

sudo

1.8.25_p1 Potentially vulnerable (1.8.25_p1-r3)

sudo-dev

1.8.25_p1 Potentially vulnerable (1.8.25_p1-r3)

sudo-doc

1.8.25_p1 Potentially vulnerable (1.8.25_p1-r3)

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-r0)

sudo-dev

1.9.5p2 Potentially vulnerable (1.9.5p2-r0)

sudo-doc

1.9.5p2 Potentially vulnerable (1.9.5p2-r0)

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-r1)

sudo-dev

1.9.5p2 Potentially vulnerable (1.9.5p2-r1)

sudo-doc

1.9.5p2 Potentially vulnerable (1.9.5p2-r1)

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-r0)

sudo-dev

1.9.5p2 Potentially vulnerable (1.9.5p2-r0)

sudo-doc

1.9.5p2 Potentially vulnerable (1.9.5p2-r0)

sudo

1.9.12 Potentially vulnerable (1.9.12-r1)

sudo-dev

1.9.12 Potentially vulnerable (1.9.12-r1)

sudo-doc

1.9.12 Potentially vulnerable (1.9.12-r1)

sudo

1.9.12_p2 Potentially vulnerable (1.9.12_p2-r0)

sudo-dev

1.9.12_p2 Potentially vulnerable (1.9.12_p2-r0)

sudo-doc

1.9.12_p2 Potentially vulnerable (1.9.12_p2-r0)

sudo

1.9.13 Potentially vulnerable (1.9.13-r0)

sudo-dev

1.9.13 Potentially vulnerable (1.9.13-r0)

sudo-doc

1.9.13 Potentially vulnerable (1.9.13-r0)

sudo

1.9.12 Potentially vulnerable (1.9.12-r1)

sudo-dev

1.9.12 Potentially vulnerable (1.9.12-r1)

sudo-doc

1.9.12 Potentially vulnerable (1.9.12-r1)

sudo

1.9.12_p2 Potentially vulnerable (1.9.12_p2-r1)

sudo-dev

1.9.12_p2 Potentially vulnerable (1.9.12_p2-r1)

sudo-doc

1.9.12_p2 Potentially vulnerable (1.9.12_p2-r1)

sudo

1.9.13_p3 Potentially vulnerable (1.9.13_p3-r2)

sudo-dev

1.9.13_p3 Potentially vulnerable (1.9.13_p3-r2)

sudo-doc

1.9.13_p3 Potentially vulnerable (1.9.13_p3-r2)

sudo

1.9.15_p2 (1.9.15_p2-r0)

sudo-dev

1.9.15_p2 (1.9.15_p2-r0)

sudo-doc

1.9.15_p2 (1.9.15_p2-r0)

sudo-doc-extra

1.9.15_p2 (1.9.15_p2-r0)

sudo

1.9.13p2 Potentially vulnerable (1:1.9.13p2-alt1)

sudo

1.9.14p1 (1:1.9.14p1-alt2)

sudo

1.9.15p1 (1:1.9.15p1-alt1)

sudo

1.8.23 Potentially vulnerable (1.8.23-9.55.amzn1)

sudo

1.8.23 Potentially vulnerable (1.8.23-10.57.amzn1)

sudo

1.8.23 Potentially vulnerable (1.8.23-9.56.amzn1)

sudo

1.8.6p3 Potentially vulnerable (1.8.6p3-29.27.amzn1)

sudo

1.8.6p3 Potentially vulnerable (1.8.6p3-29.28.amzn1)

sudo

1.8.6p3 Potentially vulnerable (1.8.6p3-29.30.amzn1)

sudo

1.8.6p3 Potentially vulnerable (1.8.6p3-29.29.amzn1)

sudo

1.8.23 Potentially vulnerable (1.8.23-4.amzn2.0.1)

sudo

1.8.23 Potentially vulnerable (1.8.23-10.amzn2.3.5)

sudo

1.8.23 Potentially vulnerable (1.8.23-10.amzn2.3.1)

sudo

1.8.23 Potentially vulnerable (1.8.23-4.amzn2.2.1)

sudo

1.8.23 Potentially vulnerable (1.8.23-4.amzn2.2)

sudo

1.8.23 Potentially vulnerable (1.8.23-10.amzn2.3.3)

sudo

1.8.23 Potentially vulnerable (1.8.23-10.amzn2.3.4)

sudo

1.8.23 Potentially vulnerable (1.8.23-10.amzn2.1)

sudo

1.8.19p2 Potentially vulnerable (1.8.19p2-14.amzn2)

sudo

1.8.19p2 Potentially vulnerable (1.8.19p2-11.amzn2)
Apertis v2021
v2021/target

sudo

1.8.27 Potentially vulnerable (1.8.27-1+deb10u4+apertis0)
Arch
core

sudo

1.9.15.p2 (1.9.15.p2-1)

sudo

1.9.12.p1 Potentially vulnerable (1.9.12.p1-1.1)

sudo

1.9.12.p1 Potentially vulnerable (1.9.12.p1-1.1)

sudo

1.9.12.p1 Potentially vulnerable (1.9.12.p1-1.1)

sudo

1.9.15.p2 (1.9.15.p2-1)

sudo

1.9.14.p3 (1.9.14.p3-1)
  • Summary:
    Give certain users the ability to run some commands as root
  • License:
    • custom
  • Link(s):

sudo

1.9.14.p3 (1.9.14.p3-1)
  • Summary:
    Give certain users the ability to run some commands as root
  • License:
    • custom
  • Link(s):

sudo

1.9.14.p3 (1.9.14.p3-1)
  • Summary:
    Give certain users the ability to run some commands as root
  • License:
    • custom
  • Link(s):

sudo-git

1.9.11.r11641.gdc8311dae (1.9.11.r11641.gdc8311dae-1)

sudo-hg

r15050.1d1696c7ad78 (r15050.1d1696c7ad78-1)

sudo-selinux

1.9.15.p2 (1.9.15.p2-1)
Artix
system

sudo

1.9.15.p2 (1.9.15.p2-1)
  • Summary:
    Give certain users the ability to run some commands as root
  • License:
    • custom
  • Link(s):

sudo

1.9.7p1 Potentially vulnerable

sudo

1.8.6p3 Potentially vulnerable (1.8.6p3-29.el6_9)
CentOS 6
updates

sudo

1.8.6p3 Potentially vulnerable (1.8.6p3-29.el6_10.2)
CentOS 6
updates

sudo

1.8.6p3 Potentially vulnerable (1.8.6p3-29.el6_10.3)

sudo

1.8.23 Potentially vulnerable (1.8.23-10.el7)
CentOS 7
updates

sudo

1.8.23 Potentially vulnerable (1.8.23-10.el7_9.1)
CentOS 7
updates

sudo

1.8.23 Potentially vulnerable (1.8.23-10.el7_9.2)
CentOS 7
updates

sudo

1.8.23 Potentially vulnerable (1.8.23-10.el7_9.3)
CentOS 8
BaseOS

sudo

1.8.29 Potentially vulnerable (1.8.29-7.el8_4.1)

sudo

1.8.29 Potentially vulnerable (1.8.29-10.el8)

sudo

1.8.29 Potentially vulnerable (1.8.29-7.el8)

sudo

1.8.29 Potentially vulnerable (1.8.29-7.el8_4.1)

sudo

1.8.29 Potentially vulnerable (1.8.29-8.el8)

sudo

1.8.29 Potentially vulnerable (1.8.29-9.el8)

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-7.el9)

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-8.el9)

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-9.el9)

Sudo

1.1.3 Potentially vulnerable
Deepin
main

sudo

1.8.27.8 Potentially vulnerable (1.8.27.8-deepin1)
Deepin
main

sudo

1.8.27.6 Potentially vulnerable (1.8.27.6-1+security)
Devuan 3.0
beowulf/main

sudo

1.8.27 Potentially vulnerable (1.8.27-1+deb10u3)
Devuan 4.0
chimaera/main

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-3+deb11u1)
Entware
aarch64-k3.10

sudo

1.8.31 Potentially vulnerable (1.8.31-1)
Entware
armv5sf-k3.2

sudo

1.8.31 Potentially vulnerable (1.8.31-1)
Entware
armv7sf-k2.6

sudo

1.8.31 Potentially vulnerable (1.8.31-1)
Entware
armv7sf-k3.2

sudo

1.8.31 Potentially vulnerable (1.8.31-1)
Entware
mipselsf-k3.4

sudo

1.8.31 Potentially vulnerable (1.8.31-1)
Entware
mipssf-k3.4

sudo

1.8.31 Potentially vulnerable (1.8.31-1)
Entware
x64-k3.2

sudo

1.8.31 Potentially vulnerable (1.8.31-1)

sudo

1.8.29 Potentially vulnerable (1.8.29-6.el8)

sudo

1.8.29 Potentially vulnerable (1.8.29-6.el8_3.1)

sudo

1.8.29 Potentially vulnerable (1.8.29-7.el8)
  • Summary:
    Allows restricted root access for specified users
  • Category:
    • Applications/System
  • License:
    • ISC
  • Link(s):

sudo

1.8.29 Potentially vulnerable (1.8.29-7.el8_4.1)
  • Summary:
    Allows restricted root access for specified users
  • Category:
    • Applications/System
  • License:
    • ISC
  • Link(s):

sudo

1.8.29 Potentially vulnerable (1.8.29-8.el8)
  • Summary:
    Allows restricted root access for specified users
  • Category:
    • Applications/System
  • License:
    • ISC
  • Link(s):

sudo

1.8.29 Potentially vulnerable (1.8.29-8.el8_7.1)
  • Summary:
    Allows restricted root access for specified users
  • Category:
    • Applications/System
  • License:
    • ISC
  • Link(s):

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-7.el9)
  • Summary:
    Allows restricted root access for specified users
  • Category:
    • Unspecified
  • License:
    • ISC
  • Link(s):

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-7.el9_1.1)
  • Summary:
    Allows restricted root access for specified users
  • Category:
    • Unspecified
  • License:
    • ISC
  • Link(s):

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-9.el9)
  • Summary:
    Allows restricted root access for specified users
  • Category:
    • Unspecified
  • License:
    • ISC
  • Link(s):
Exherbo
arbor

app-admin/sudo

1.9.14_p3
Fedora 26
updates

sudo

1.8.21p2 Potentially vulnerable (1.8.21p2-1.fc26)
Fedora 26
release

sudo

1.8.20p2 Potentially vulnerable (1.8.20p2-1.fc26)
Fedora 27
updates

sudo

1.8.23 Potentially vulnerable (1.8.23-1.fc27)
Fedora 27
release

sudo

1.8.21p2 Potentially vulnerable (1.8.21p2-1.fc27)
Fedora 28
updates

sudo

1.8.23 Potentially vulnerable (1.8.23-1.fc28)
Fedora 28
release

sudo

1.8.22 Potentially vulnerable (1.8.22-0.2.b1.fc28)
Fedora 29
updates

sudo

1.8.28 Potentially vulnerable (1.8.28-1.fc29)
Fedora 29
release

sudo

1.8.23 Potentially vulnerable (1.8.23-3.fc29)
Fedora 30
updates

sudo

1.8.31p1 Potentially vulnerable (1.8.31p1-1.fc30)
Fedora 30
release

sudo

1.8.27 Potentially vulnerable (1.8.27-1.fc30)
Fedora 31
updates

sudo

1.9.2 Potentially vulnerable (1.9.2-1.fc31)
Fedora 31
release

sudo

1.8.28 Potentially vulnerable (1.8.28-1.fc31)
Fedora 32
updates

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-1.fc32)
Fedora 32
release

sudo

1.9.0 Potentially vulnerable (1.9.0-0.1.b4.fc32)
Fedora 33
updates

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-1.fc33)
Fedora 33
release

sudo

1.9.2 Potentially vulnerable (1.9.2-1.fc33)
Fedora 34
release

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-1.fc34)
Fedora 35
release

sudo

1.9.7p2 Potentially vulnerable (1.9.7p2-2.fc35)
Fedora 36
updates

sudo

1.9.13 Potentially vulnerable (1.9.13-1.p2.fc36)
Fedora 36
release

sudo

1.9.8 Potentially vulnerable (1.9.8-5.p2.fc36)
Fedora 37
updates

sudo

1.9.13 Potentially vulnerable (1.9.13-1.p2.fc37)
Fedora 37
release

sudo

1.9.11 Potentially vulnerable (1.9.11-4.p3.fc37)
Fedora 38
release

sudo

1.9.13 Potentially vulnerable (1.9.13-1.p2.fc38)
Fedora 38
updates

sudo

1.9.13 Potentially vulnerable (1.9.13-2.p2.fc38)
Fedora 39
development

sudo

1.9.14 (1.9.14-1.p3.fc39)
Fedora Rawhide
development

sudo

1.9.14 (1.9.14-1.p3.fc39)

security/sudo

1.9.15p2

app-admin/sudo

9999

app-admin/sudo

1.9.15_p2

app-admin/sudo

1.9.14_p3

app-admin/sudo

1.9.14_p2

app-admin/sudo

1.9.13_p3 Potentially vulnerable (1.9.13_p3-r1)

Sudo

1.9.5p2 Potentially vulnerable
HP-UX 11.31
ia64_64

sudo

1.9.15
HP-UX 11.31
hppa_32

sudo

1.9.3p1 Potentially vulnerable
HP-UX 11.31
ia64_64

sudo

1.9.3p1 Potentially vulnerable
HP-UX 11.31
hppa_32

sudo

1.8.20p2 Potentially vulnerable
HP-UX 11.31
ia64_32

sudo

1.8.20p2 Potentially vulnerable
KaOS
core

sudo

1.9.15.p2 (1.9.15.p2-1)

app-admin/sudo

1.9.14_p3

app-admin/sudo

1.9.14_p2

app-admin/sudo

1.9.13_p3 Potentially vulnerable

app-admin/sudo

1.9.15_p2

app-admin/sudo

1.9.14_p3
Mageia 8
core/release

sudo

1.9.5p2 Potentially vulnerable (1:1.9.5p2-2.mga8)
Mageia 8
core/updates

sudo

1.9.5p2 Potentially vulnerable (1:1.9.5p2-2.1.mga8)
Mageia 8
core/updates

sudo

1.9.5p2 Potentially vulnerable (1:1.9.5p2-2.2.mga8)
Mageia 8
core/updates

sudo

1.9.5p2 Potentially vulnerable (1:1.9.5p2-2.3.mga8)
Mageia cauldron
core/release

sudo

1.9.13p2 Potentially vulnerable (1:1.9.13p2-2.mga9)

sudo

1.9.15.p2 (1.9.15.p2-1)
  • Summary:
    Give certain users the ability to run some commands as root
  • License:
    • custom
  • Link(s):

sudo

1.9.15.p2 (1.9.15.p2-1)
  • Summary:
    Give certain users the ability to run some commands as root
  • License:
    • custom
  • Link(s):

sudo

1.9.15.p2 (1.9.15.p2-1)
  • Summary:
    Give certain users the ability to run some commands as root
  • License:
    • custom
  • Link(s):

security/sudo

1.9.12p2 Potentially vulnerable

sudo

1.9.7p2 Potentially vulnerable

sudo

1.9.10 Potentially vulnerable

sudo

1.9.13p3 Potentially vulnerable

sudo

1.9.13p3 Potentially vulnerable

sudo

1.9.15p2

sudo

1.8.27 Potentially vulnerable (1.8.27-4.oe1)

sudo

1.9.8p2 Potentially vulnerable (1.9.8p2-2.oe2203)

sudo

1.9.15p2

sudo

1.9.15

sudo

1.9.14p3
openmamba
devel

sudo

1.9.15 (1.9.15-1mamba)
OpenMandriva 4.0
main/release

sudo

1.8.27 Potentially vulnerable (1:1.8.27-1)
OpenMandriva 4.1
main/release

sudo

1.8.30 Potentially vulnerable (1:1.8.30-1)
OpenMandriva 4.2
main/updates

sudo

1.9.6 Potentially vulnerable (1.9.6-1)
OpenMandriva 4.2
main/release

sudo

1.9.5 Potentially vulnerable (1:1.9.5-1)
OpenMandriva 4.3
main/release

sudo

1.9.8p2 Potentially vulnerable (1.9.8p2-2)

sudo

1.9.15p2 (1.9.15p2-1)
OpenMandriva Cooker
main/release

sudo

1.9.15p2 (1.9.15p2-1)

sudo

1.9.15p2

sudo

1.9.15p1

sudo

1.8.20p2 Potentially vulnerable (1.8.20p2-1.3)
openSUSE Leap 42.3
updates/oss

sudo

1.8.20p2 Potentially vulnerable (1.8.20p2-2.3.1)
openSUSE Leap 15.0
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.16.1)
openSUSE Leap 15.0
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.3.1)
openSUSE Leap 15.0
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.13.1)
openSUSE Leap 15.0
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.6.1)

sudo

1.8.22 Potentially vulnerable (1.8.22-lp150.2.6)
openSUSE Leap 15.0
updates/oss

sudo

1.8.22 Potentially vulnerable (1.8.22-lp150.3.3.1)
openSUSE Leap 15.0
updates/oss

sudo

1.8.22 Potentially vulnerable (1.8.22-lp150.8.1)
openSUSE Leap 15.1
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.13.1)
openSUSE Leap 15.1
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.16.1)
openSUSE Leap 15.1
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.3.1)
openSUSE Leap 15.1
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.6.1)

sudo

1.8.22 Potentially vulnerable (1.8.22-lp151.4.31)
openSUSE Leap 15.1
updates/oss

sudo

1.8.22 Potentially vulnerable (1.8.22-lp151.5.12.1)
openSUSE Leap 15.1
updates/oss

sudo

1.8.22 Potentially vulnerable (1.8.22-lp151.5.3.1)
openSUSE Leap 15.1
updates/oss

sudo

1.8.22 Potentially vulnerable (1.8.22-lp151.5.6.1)
openSUSE Leap 15.1
updates/oss

sudo

1.8.22 Potentially vulnerable (1.8.22-lp151.5.9.1)
openSUSE Leap 15.2
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.13.1)
openSUSE Leap 15.2
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.16.1)
openSUSE Leap 15.2
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.3.1)
openSUSE Leap 15.2
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.6.1)
openSUSE Leap 15.2
updates/oss

sudo

1.8.27 Potentially vulnerable (1.8.27-lp152.8.12.1)

sudo

1.8.22 Potentially vulnerable (1.8.22-lp152.7.17)
openSUSE Leap 15.2
updates/oss

sudo

1.8.22 Potentially vulnerable (1.8.22-lp152.8.3.1)
openSUSE Leap 15.2
updates/oss

sudo

1.8.22 Potentially vulnerable (1.8.22-lp152.8.6.1)
openSUSE Leap 15.2
updates/oss

sudo

1.8.22 Potentially vulnerable (1.8.22-lp152.8.9.1)

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-1.5)
openSUSE Leap 15.3
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.13.1)
openSUSE Leap 15.3
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.16.1)
openSUSE Leap 15.3
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.3.1)
openSUSE Leap 15.3
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.6.1)

sudo

1.9.9 Potentially vulnerable (1.9.9-150400.2.5)
openSUSE Leap 15.4
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.13.1)
openSUSE Leap 15.4
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.16.1)
openSUSE Leap 15.4
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.3.1)
openSUSE Leap 15.4
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.6.1)

sudo

1.9.12p1 Potentially vulnerable (1.9.12p1-150500.5.1)
openSUSE Leap 15.5
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.13.1)
openSUSE Leap 15.5
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.16.1)
openSUSE Leap 15.5
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.3.1)
openSUSE Leap 15.5
updates/sle

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-150300.3.6.1)

sudo

1.9.14p3 (1.9.14p3-1.1)

sudo

1.8.14p3 Potentially vulnerable (1.8.14p3-1)

sudo

1.9.15.p2 (1.9.15.p2-1)
Pardus 21
updates/main

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-3+deb11u1)
Parrot
parrot-updates/main

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-3+deb11u1)
Parrot
parrot/main

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-3+deb11u1)

sudo

1.9.10 Potentially vulnerable (1.9.10-1pclos2022)
  • Summary:
    Allows command execution as root for specified users
  • Category:
    • System/Base

sudo

1.9.15_p2

security/sudo

1.9.15p2

sudo

1.8.27 Potentially vulnerable (1.8.27-1+deb10u3)

sudo

1.8.29 Potentially vulnerable (1.8.29-10.el8)
Rocky Linux 9
AppStream

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-9.el9)

sudo

1.9.5p2 Potentially vulnerable (1.9.5p2-9.el9)
Rosa 2021.1
main/release

sudo

1.9.14p3 (1:1.9.14p3-2)
Rosa Server 6.9
base/release

sudo

1.8.6p3 Potentially vulnerable (1.8.6p3-24.res6)
Rosa Server 6.9
base/release

sudo

1.8.6p3 Potentially vulnerable (1.8.6p3-20.res6)
Rosa Server 6.9
base/release

sudo

1.8.6p3 Potentially vulnerable (1.8.6p3-28.res6)
Rosa Server 7.3
base/release

sudo

1.8.6p7 Potentially vulnerable (1.8.6p7-23.res7)
Rosa Server 7.5
base/release

sudo

1.8.19p2 Potentially vulnerable (1.8.19p2-13.res7)
Rosa Server 7.5
base/release

sudo

1.8.6p7 Potentially vulnerable (1.8.6p7-23.res7)

sudo

1.8.23 Potentially vulnerable (1.8.23-9.el7)

sudo

1.8.23 Potentially vulnerable (1.8.23-10.el7)

sudo

1.8.23 Potentially vulnerable (1.8.23-10.el7_9.1)

sudo

1.8.23 Potentially vulnerable (1.8.23-10.el7_9.2)

sudo

1.8.23 Potentially vulnerable (1.8.23-10.el7_9.3)

sudo

1.8.23 Potentially vulnerable (1.8.23-3.el7)

sudo

1.8.23 Potentially vulnerable (1.8.23-4.el7)

sudo

1.8.23 Potentially vulnerable (1.8.23-4.el7_7.1)

sudo

1.8.23 Potentially vulnerable (1.8.23-4.el7_7.2)

sudo

1.8.19p2 Potentially vulnerable (1.8.19p2-10.el7)

sudo

1.8.19p2 Potentially vulnerable (1.8.19p2-11.el7_4)

sudo

1.8.19p2 Potentially vulnerable (1.8.19p2-13.el7)

sudo

1.8.19p2 Potentially vulnerable (1.8.19p2-14.el7_5)

sudo

1.8.6p7 Potentially vulnerable (1.8.6p7-11.el7)

sudo

1.8.6p7 Potentially vulnerable (1.8.6p7-13.el7)

sudo

1.8.6p7 Potentially vulnerable (1.8.6p7-16.el7)

sudo

1.8.6p7 Potentially vulnerable (1.8.6p7-17.el7_2)

sudo

1.8.6p7 Potentially vulnerable (1.8.6p7-20.el7)

sudo

1.8.6p7 Potentially vulnerable (1.8.6p7-21.el7_3)

sudo

1.8.6p7 Potentially vulnerable (1.8.6p7-22.el7_3)

sudo

1.8.6p7 Potentially vulnerable (1.8.6p7-23.el7_3)

sudo

1.8.6p7 Potentially vulnerable (1.8.6p7-7.el7)

sudo

1.9.15p1
Slackware 14.2
slackware

sudo

1.8.16 Potentially vulnerable

sudo

1.9.15p1
Slackware 15.0
slackware

sudo

1.9.9 Potentially vulnerable

sudo

1.9.15p2

sudo

1.9.15p1
Slackware64 14.2
slackware64

sudo

1.8.16 Potentially vulnerable

sudo

1.9.15p1
Slackware64 15.0
slackware64

sudo

1.9.9 Potentially vulnerable

sudo

1.9.15p2

sudo

1.9.13p3 Potentially vulnerable

sudo

1.8.16 Potentially vulnerable

sudo

1.9.15p1

sudo

1.9.9 Potentially vulnerable

sudo

1.9.5p2 Potentially vulnerable

sudo-lang

1.9.5p2 Potentially vulnerable

sudo-pam

1.9.5p2 Potentially vulnerable

sudo

1.8.20p2 Potentially vulnerable

sudo

1.8.20p2 Potentially vulnerable

sudo-dev

1.8.20p2 Potentially vulnerable

sudo-dev

1.8.20p2 Potentially vulnerable

sudo-pam

1.8.20p2 Potentially vulnerable

sudo-pam

1.8.20p2 Potentially vulnerable

sudo-pam-dev

1.8.20p2 Potentially vulnerable

sudo-pam-dev

1.8.20p2 Potentially vulnerable

sudo

1.9.15_p2

sudo-dbginfo

1.9.15_p2

sudo-devel

1.9.15_p2

sudo-docs

1.9.15_p2

sudo

1.9.14p3
Trisquel 10.0
nabia-updates/main

sudo

1.8.31 Potentially vulnerable (1.8.31-1ubuntu1.5)
Trisquel 10.0
nabia-updates/main

sudo

1.8.31 Potentially vulnerable (1.8.31-1ubuntu1.2)
Trisquel 10.0
nabia-security/main

sudo

1.8.31 Potentially vulnerable (1.8.31-1ubuntu1.5)
Trisquel 10.0
nabia-security/main

sudo

1.8.31 Potentially vulnerable (1.8.31-1ubuntu1.2)
Trisquel 10.0
nabia/main

sudo

1.8.31 Potentially vulnerable (1.8.31-1ubuntu1)
UBI 8
baseos

sudo

1.8.29 Potentially vulnerable (1.8.29-10.el8)
  • Summary:
    Allows restricted root access for specified users
  • Category:
    • Applications/System
  • License:
    • ISC
  • Link(s):
Ubuntu 14.04
trusty-updates/main

sudo

1.8.9p5 Potentially vulnerable (1.8.9p5-1ubuntu1.4)
Ubuntu 14.04
trusty/main

sudo

1.8.9p5 Potentially vulnerable (1.8.9p5-1ubuntu1)
Ubuntu 16.04
xenial-updates/main

sudo

1.8.16 Potentially vulnerable (1.8.16-0ubuntu1.10)
Ubuntu 18.04
bionic/main

sudo

1.8.21p2 Potentially vulnerable (1.8.21p2-3ubuntu1)
Ubuntu 18.04
bionic-updates/main

sudo

1.8.21p2 Potentially vulnerable (1.8.21p2-3ubuntu1.6)

sudo

1.9.15p2 (1.9.15p2_1)

sudo

1.9.15

sudo

1.9.14p3

sudo

1.9.9 Potentially vulnerable