Versions Packages Information History CVEs Related Badges Report

Versions for sudo

494 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
system
sudo 1.9.10 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
sudo-dbg 1.9.10 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
sudo-dev 1.9.10 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
sudo-lang 1.9.10 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
sudo-doc 1.9.10 Potentially vulnerable - horst@adelielinux.org
AIX Open Source Packages sudo 1.9.2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.9.1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.9.0 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.31p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.31p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.31 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.30 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.29 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.28p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.28 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.27 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.26 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.25p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.25 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.24 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.23 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.22 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.21p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.21p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.21 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.20p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.20p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.20 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.19p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.19p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.19 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.18p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.18p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.18 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.17p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.17 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.16 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.15 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.15 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.14p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.14p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.14p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.14 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.13 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.12 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.11p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.11p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.11p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.11 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.11 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.10p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.10p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.10p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.10p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.10 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.9p5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.9p5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.9p4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.9p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.9p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.9p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.9 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.8 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.7 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.7 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p8 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p8 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p7 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p6 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.5p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.5p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.5p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.4p5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.4p4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.4p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.4p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.3p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.3p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.1p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.1p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.0 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p9 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p8 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p7 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p6 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.9p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.9 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.8p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.8p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.8 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.7 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.6p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.6p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.6 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.4p6 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.4p5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.4p4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.4p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2p8 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2p7 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2p5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2p4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.0 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.0rc5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.0rc2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7b4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.6.9p23 Potentially vulnerable - -
AIX Open Source Packages sudo 1.6.9p20 Potentially vulnerable - -
AIX Open Source Packages sudo 1.6.9p18 Potentially vulnerable - -
AIX Open Source Packages sudo 1.6.9p17 Potentially vulnerable - -
AIX Open Source Packages sudo 1.6.9p16 Potentially vulnerable - -
AIX Open Source Packages sudo 1.6.9p15 Potentially vulnerable - -
AIX Open Source Packages sudo 1.6.9p14 Potentially vulnerable - -
AIX Toolbox sudo 1.8.31p1 Potentially vulnerable Applications/System -
AIX Toolbox sudo 1.8.31p1 Potentially vulnerable Applications/System -
AIX Toolbox sudo 1.8.28 Potentially vulnerable Applications/System -
AIX Toolbox sudo 1.8.27 Potentially vulnerable Applications/System -
AIX Toolbox sudo 1.8.27 Potentially vulnerable Applications/System -
AIX Toolbox sudo 1.8.27 Potentially vulnerable Applications/System -
AIX Toolbox sudo 1.8.21p2 Potentially vulnerable Applications/System -
AlmaLinux 8
BaseOS
sudo 1.8.29 Potentially vulnerable Applications/System packager@almalinux.org
AlmaLinux 8
BaseOS
sudo 1.8.29 Potentially vulnerable Applications/System packager@almalinux.org
AlmaLinux 9
BaseOS
sudo 1.9.5p2 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
sudo 1.9.5p2 Potentially vulnerable Unspecified packager@almalinux.org
Alpine Linux 3.8
main
sudo 1.8.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
sudo-dev 1.8.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
sudo-doc 1.8.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
sudo-dev 1.8.25_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
sudo-doc 1.8.25_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
sudo 1.8.25_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
sudo 1.9.5p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
sudo-doc 1.9.5p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
sudo-dev 1.9.5p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
sudo 1.9.5p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
sudo-dev 1.9.5p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
sudo-doc 1.9.5p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
sudo 1.9.5p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
sudo-doc 1.9.5p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
sudo-dev 1.9.5p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
sudo 1.9.12 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
sudo-dev 1.9.12 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
sudo-doc 1.9.12 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
sudo-doc 1.9.12_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
sudo-dev 1.9.12_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
sudo 1.9.12_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
sudo-doc 1.9.12_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
sudo-dev 1.9.12_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
sudo 1.9.12_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
sudo-doc 1.9.12 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
sudo-dev 1.9.12 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
community
sudo 1.9.12 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
sudo-dev 1.9.12_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
sudo 1.9.12_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.17
community
sudo-doc 1.9.12_p2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
sudo-doc 1.9.13_p3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
sudo-dev 1.9.13_p3 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux Edge
community
sudo 1.9.13_p3 Potentially vulnerable - ncopa@alpinelinux.org
ALT Linux p9 sudo 1.9.7p2 Potentially vulnerable System/Base sin@altlinux.org
ALT Linux p10 sudo 1.9.13p2 Potentially vulnerable System/Base sin@altlinux.org
ALT Sisyphus sudo 1.9.13p2 Potentially vulnerable System/Base sin@altlinux.org
Amazon Linux 1
updates
sudo 1.8.23 Potentially vulnerable Applications/System -
Amazon Linux 1
updates
sudo 1.8.23 Potentially vulnerable Applications/System -
Amazon Linux 1
updates
sudo 1.8.23 Potentially vulnerable Applications/System -
Amazon Linux 1
updates
sudo 1.8.6p3 Potentially vulnerable Applications/System -
Amazon Linux 1
updates
sudo 1.8.6p3 Potentially vulnerable Applications/System -
Amazon Linux 1
main
sudo 1.8.6p3 Potentially vulnerable Applications/System -
Amazon Linux 1
updates
sudo 1.8.6p3 Potentially vulnerable Applications/System -
Amazon Linux 2 sudo 1.8.23 Potentially vulnerable Applications/System -
Amazon Linux 2 sudo 1.8.23 Potentially vulnerable Applications/System -
Amazon Linux 2 sudo 1.8.23 Potentially vulnerable Applications/System -
Amazon Linux 2 sudo 1.8.23 Potentially vulnerable Applications/System -
Amazon Linux 2 sudo 1.8.23 Potentially vulnerable Applications/System -
Amazon Linux 2 sudo 1.8.19p2 Potentially vulnerable Applications/System -
Amazon Linux 2 sudo 1.8.19p2 Potentially vulnerable Applications/System -
AOSC sudo 1.9.12p1 Potentially vulnerable admin fallback-mnt-aosc@repology
Apertis v2020
v2020/target
sudo 1.8.27 Potentially vulnerable main bdale@gag.com
Apertis v2021
v2021/target
sudo 1.8.27 Potentially vulnerable main bdale@gag.com
Apertis v2022
v2022/target
sudo 1.9.5p2 Potentially vulnerable main sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Apertis v2023 Development
v2023dev1/target
sudo 1.9.5p2 Potentially vulnerable main sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Arch
core
sudo 1.9.13.p3 Potentially vulnerable - -
Arch Linux 32 i486
core
sudo 1.9.12.p1 Potentially vulnerable - -
Arch Linux 32 i686
core
sudo 1.9.12.p1 Potentially vulnerable - -
Arch Linux 32 pentium4
core
sudo 1.9.12.p1 Potentially vulnerable - -
Arch Linux ARM aarch64
core
sudo 1.9.13.p3 Potentially vulnerable - -
Arch Linux ARM armv7h
core
sudo 1.9.13.p3 Potentially vulnerable - -
ArchPOWER powerpc sudo 1.9.12.p1 Potentially vulnerable - -
ArchPOWER powerpc64le sudo 1.9.12.p1 Potentially vulnerable - -
ArchPOWER riscv64 sudo 1.9.12.p1 Potentially vulnerable - -
AUR sudo-git 1.9.11.r11641.gdc8311dae - dylan14@aur
AUR sudo-hg r13307.c7839328e21f - chocobo1@aur
AUR sudo-selinux 1.9.13.p2 Potentially vulnerable - ioonag@aur
Artix
system
sudo 1.9.13.p3 Potentially vulnerable - -
Astra Orel Stable
main
sudo 1.8.19p1 Potentially vulnerable admin bdale@gag.com
Ataraxia GNU/Linux sudo 1.9.7p1 Potentially vulnerable admin nagakamira@gmail.com
CentOS 6
os
sudo 1.8.6p3 Potentially vulnerable Applications/System -
CentOS 6
updates
sudo 1.8.6p3 Potentially vulnerable Applications/System -
CentOS 6
updates
sudo 1.8.6p3 Potentially vulnerable Applications/System -
CentOS 7
os
sudo 1.8.23 Potentially vulnerable Applications/System -
CentOS 7
updates
sudo 1.8.23 Potentially vulnerable Applications/System -
CentOS 7
updates
sudo 1.8.23 Potentially vulnerable Applications/System -
CentOS 7
updates
sudo 1.8.23 Potentially vulnerable Applications/System -
CentOS 8
BaseOS
sudo 1.8.29 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 8
BaseOS
sudo 1.8.29 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 8
BaseOS
sudo 1.8.29 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 8
BaseOS
sudo 1.8.29 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 8
BaseOS
sudo 1.8.29 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 8
BaseOS
sudo 1.8.29 Potentially vulnerable Applications/System bugs@centos.org
CentOS Stream 9
BaseOS
sudo 1.9.5p2 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
sudo 1.9.5p2 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
sudo 1.9.5p2 Potentially vulnerable Unspecified builder@centos.org
Chocolatey Sudo 1.1.3 Potentially vulnerable - -
CRUX 3.4
core
sudo 1.8.27 Potentially vulnerable - core-ports@crux.nu
CRUX 3.5
core
sudo 1.9.5p1 Potentially vulnerable - core-ports@crux.nu
CRUX 3.6
core
sudo 1.9.11p3 Potentially vulnerable - core-ports@crux.nu
CRUX 3.7
core
sudo 1.9.13p3 Potentially vulnerable - core-ports@crux.nu
Debian 8
jessie/main
sudo 1.8.10p3 Potentially vulnerable admin bdale@gag.com
Debian 8
jessie/updates/main
sudo 1.8.10p3 Potentially vulnerable admin bdale@gag.com
Debian 9
stretch/main
sudo 1.8.19p1 Potentially vulnerable admin bdale@gag.com
Debian 9
stretch/updates/main
sudo 1.8.19p1 Potentially vulnerable admin bdale@gag.com
Debian 10
buster/main
sudo 1.8.27 Potentially vulnerable admin bdale@gag.com
Debian 10
buster/updates/main
sudo 1.8.27 Potentially vulnerable admin bdale@gag.com
Debian 11
bullseye/main
sudo 1.9.5p2 Potentially vulnerable admin sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Debian 11
bullseye-security/main
sudo 1.9.5p2 Potentially vulnerable admin sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Debian 12
bookworm/main
sudo 1.9.13p3 Potentially vulnerable admin sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Debian Janitor - Snapshots sudo 1.9.10+git20220316.1.6af2b41 Potentially vulnerable - sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Debian Unstable
sid/main
sudo 1.9.13p3 Potentially vulnerable admin sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Deepin
main
sudo 1.8.27.8 Potentially vulnerable - bdale@gag.com
Deepin
main
sudo 1.8.27.6 Potentially vulnerable - bdale@gag.com
Devuan 1.0
jessie/main
sudo 1.8.10p3 Potentially vulnerable admin bdale@gag.com
Devuan 2.0
ascii/main
sudo 1.8.19p1 Potentially vulnerable admin bdale@gag.com
Devuan 3.0
beowulf/main
sudo 1.8.27 Potentially vulnerable admin bdale@gag.com
Devuan 4.0
chimaera/main
sudo 1.9.5p2 Potentially vulnerable admin sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Devuan Unstable
unstable/main
sudo 1.9.13p3 Potentially vulnerable admin sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
distri sudo 1.8.31p1 Potentially vulnerable - -
Entware
aarch64-k3.10
sudo 1.8.31 Potentially vulnerable admin fallback-mnt-entware@repology
Entware
armv5sf-k3.2
sudo 1.8.31 Potentially vulnerable admin fallback-mnt-entware@repology
Entware
armv7sf-k2.6
sudo 1.8.31 Potentially vulnerable admin fallback-mnt-entware@repology
Entware
armv7sf-k3.2
sudo 1.8.31 Potentially vulnerable admin fallback-mnt-entware@repology
Entware
mipselsf-k3.4
sudo 1.8.31 Potentially vulnerable admin fallback-mnt-entware@repology
Entware
mipssf-k3.4
sudo 1.8.31 Potentially vulnerable admin fallback-mnt-entware@repology
Entware
x64-k3.2
sudo 1.8.31 Potentially vulnerable admin fallback-mnt-entware@repology
EuroLinux 8
baseos
sudo 1.8.29 Potentially vulnerable Applications/System -
EuroLinux 8
baseos
sudo 1.8.29 Potentially vulnerable Applications/System -
EuroLinux 8
baseos
sudo 1.8.29 Potentially vulnerable Applications/System -
EuroLinux 8
baseos
sudo 1.8.29 Potentially vulnerable Applications/System -
EuroLinux 8
baseos
sudo 1.8.29 Potentially vulnerable Applications/System -
EuroLinux 9
baseos
sudo 1.9.5p2 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
sudo 1.9.5p2 Potentially vulnerable Unspecified -
Exherbo
arbor
app-admin/sudo 1.9.13_p3 Potentially vulnerable app-admin fallback-mnt-exherbo@repology
Fedora 26
updates
sudo 1.8.21p2 Potentially vulnerable Applications/System -
Fedora 26
release
sudo 1.8.20p2 Potentially vulnerable Applications/System -
Fedora 27
updates
sudo 1.8.23 Potentially vulnerable Applications/System -
Fedora 27
release
sudo 1.8.21p2 Potentially vulnerable Applications/System -
Fedora 28
updates
sudo 1.8.23 Potentially vulnerable Applications/System -
Fedora 28
release
sudo 1.8.22 Potentially vulnerable Applications/System -
Fedora 29
updates
sudo 1.8.28 Potentially vulnerable Applications/System -
Fedora 29
release
sudo 1.8.23 Potentially vulnerable Applications/System -
Fedora 30
updates
sudo 1.8.31p1 Potentially vulnerable Unspecified -
Fedora 30
release
sudo 1.8.27 Potentially vulnerable Unspecified -
Fedora 31
updates
sudo 1.9.2 Potentially vulnerable Unspecified -
Fedora 31
release
sudo 1.8.28 Potentially vulnerable Unspecified -
Fedora 32
updates
sudo 1.9.5p2 Potentially vulnerable Unspecified -
Fedora 32
release
sudo 1.9.0 Potentially vulnerable Unspecified -
Fedora 33
updates
sudo 1.9.5p2 Potentially vulnerable Unspecified -
Fedora 33
release
sudo 1.9.2 Potentially vulnerable Unspecified -
Fedora 34
release
sudo 1.9.5p2 Potentially vulnerable Unspecified -
Fedora 35
release
sudo 1.9.7p2 Potentially vulnerable Unspecified -
Fedora 36
updates
sudo 1.9.13 Potentially vulnerable Unspecified -
Fedora 36
release
sudo 1.9.8 Potentially vulnerable Unspecified -
Fedora 37
updates
sudo 1.9.13 Potentially vulnerable Unspecified -
Fedora 37
release
sudo 1.9.11 Potentially vulnerable Unspecified -
Fedora Rawhide
development
sudo 1.9.13 Potentially vulnerable Unspecified -
FreeBSD Ports security/sudo 1.9.13p3 Potentially vulnerable security garga@freebsd.org
Gentoo app-admin/sudo 9999 app-admin base-system@gentoo.org
Gentoo app-admin/sudo 1.9.13_p3 Potentially vulnerable app-admin base-system@gentoo.org
Gentoo app-admin/sudo 1.9.12_p2 Potentially vulnerable app-admin base-system@gentoo.org
GNU Guix sudo 1.9.13p2 Potentially vulnerable - -
GoboLinux Sudo 1.9.5p2 Potentially vulnerable - -
HP-UX 11.31
ia64_64
sudo 1.9.13p3 Potentially vulnerable - -
HP-UX 11.31
hppa_32
sudo 1.9.3p1 Potentially vulnerable - -
HP-UX 11.31
ia64_64
sudo 1.9.3p1 Potentially vulnerable - -
HP-UX 11.31
hppa_32
sudo 1.8.20p2 Potentially vulnerable - -
HP-UX 11.31
ia64_32
sudo 1.8.20p2 Potentially vulnerable - -
Kali Linux Rolling
main
sudo 1.9.13p3 Potentially vulnerable admin sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
KaOS
core
sudo 1.9.13.p3 Potentially vulnerable - demm@kaosx.us
LiGurOS stable app-admin/sudo 1.9.12_p2 Potentially vulnerable app-admin dev@liguros.net, base-system@gentoo.org
LiGurOS stable app-admin/sudo 1.9.12_p1 Potentially vulnerable app-admin dev@liguros.net, base-system@gentoo.org
LiGurOS develop app-admin/sudo 1.9.13_p3 Potentially vulnerable app-admin dev@liguros.net, base-system@gentoo.org
LiGurOS develop app-admin/sudo 1.9.13_p2 Potentially vulnerable app-admin dev@liguros.net, base-system@gentoo.org
MacPorts sudo 1.9.13p3 Potentially vulnerable sysutils mps@macports, schamschula@github
Mageia 7
core/updates
sudo 1.9.5p2 Potentially vulnerable System/Base -
Mageia 7
core/updates
sudo 1.9.5 Potentially vulnerable System/Base -
Mageia 7
core/updates
sudo 1.8.31p1 Potentially vulnerable System/Base -
Mageia 7
core/updates
sudo 1.8.28 Potentially vulnerable System/Base -
Mageia 7
core/updates
sudo 1.8.28 Potentially vulnerable System/Base -
Mageia 7
core/release
sudo 1.8.27 Potentially vulnerable System/Base -
Mageia 8
core/release
sudo 1.9.5p2 Potentially vulnerable System/Base -
Mageia 8
core/updates
sudo 1.9.5p2 Potentially vulnerable System/Base -
Mageia 8
core/updates
sudo 1.9.5p2 Potentially vulnerable System/Base -
Mageia Cauldron
core/release
sudo 1.9.13p2 Potentially vulnerable System/Base -
Manjaro Stable
core
sudo 1.9.12.p2 Potentially vulnerable - -
Manjaro Testing
core
sudo 1.9.13.p3 Potentially vulnerable - -
Manjaro Unstable
core
sudo 1.9.13.p3 Potentially vulnerable - -
MidnightBSD mports security/sudo 1.9.12p2 Potentially vulnerable security -
nixpkgs stable 21.11 sudo 1.9.7p2 Potentially vulnerable - edolstra+nixpkgs@gmail.com, delroth@gmail.com
nixpkgs stable 22.05 sudo 1.9.10 Potentially vulnerable - edolstra+nixpkgs@gmail.com, delroth@gmail.com
nixpkgs stable 22.11 sudo 1.9.13p3 Potentially vulnerable - edolstra+nixpkgs@gmail.com, delroth@gmail.com
nixpkgs unstable sudo 1.9.13p3 Potentially vulnerable - edolstra+nixpkgs@gmail.com, delroth@gmail.com
NOIR Linux Main
extra
sudo 1.9.13p1 Potentially vulnerable - mmatongo_@hotmail.com
OpenBSD Ports security/sudo 1.9.13.3 security millert@openbsd.org
OpenBSD Ports security/sudo 1.9.13.3 security millert@openbsd.org
OpenBSD Ports security/sudo 1.9.13.3 security millert@openbsd.org
OpenBSD Ports security/sudo 1.9.13.3 security millert@openbsd.org
OpenBSD Ports security/sudo 1.9.13.3 security millert@openbsd.org
OpenBSD Ports security/sudo 1.9.13.3 security millert@openbsd.org
OpenBSD Ports security/sudo 1.9.13.3 security millert@openbsd.org
OpenBSD Ports security/sudo 1.9.13.3 security millert@openbsd.org
OpenBSD Ports security/sudo 1.9.13.3 security millert@openbsd.org
openEuler 20.03
source
sudo 1.8.27 Potentially vulnerable Unspecified -
openEuler 22.03
source
sudo 1.9.8p2 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
sudo 1.9.13p3 Potentially vulnerable Applications/System Utilities -
OpenIndiana packages
hipster
sudo 1.9.13p2 Potentially vulnerable Applications/System Utilities -
OpenIndiana packages
hipster
sudo 1.9.13p1 Potentially vulnerable Applications/System Utilities -
OpenIndiana packages
hipster
sudo 1.9.12p2 Potentially vulnerable Applications/System Utilities -
OpenIndiana packages
hipster
sudo 1.9.12p1 Potentially vulnerable Applications/System Utilities -
OpenIndiana packages
hipster
sudo 1.9.12 Potentially vulnerable Applications/System Utilities -
OpenIndiana packages
hipster
sudo 1.9.11p3 Potentially vulnerable Applications/System Utilities -
openmamba
devel
sudo 1.9.13 Potentially vulnerable System/Tools silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
sudo 1.8.27 Potentially vulnerable System/Base bero@lindev.ch
OpenMandriva 4.1
main/release
sudo 1.8.30 Potentially vulnerable System/Base nobodydead@gmail.com
OpenMandriva 4.2
main/updates
sudo 1.9.6 Potentially vulnerable System/Base tpgxyz@gmail.com
OpenMandriva 4.2
main/release
sudo 1.9.5 Potentially vulnerable System/Base bero@lindev.ch
OpenMandriva 4.3
main/release
sudo 1.9.8p2 Potentially vulnerable System/Base bero@lindev.ch
OpenMandriva Rolling
main/release
sudo 1.9.13p2 Potentially vulnerable System/Base bero@lindev.ch
OpenMandriva Cooker
main/release
sudo 1.9.13p2 Potentially vulnerable System/Base bero@lindev.ch
OpenPKG sudo 1.9.13p3 Potentially vulnerable ShellUtils -
openSUSE Leap 42.3
updates/oss
sudo 1.8.20p2 Potentially vulnerable System/Base -
openSUSE Leap 42.3
main/oss
sudo 1.8.20p2 Potentially vulnerable System/Base -
openSUSE Leap 15.0
main/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.1
main/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
sudo 1.8.27 Potentially vulnerable System/Base -
openSUSE Leap 15.2
main/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.2
updates/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.3
main/oss
sudo 1.9.5p2 Potentially vulnerable System/Base -
openSUSE Leap 15.4
main/oss
sudo 1.9.9 Potentially vulnerable System/Base -
openSUSE Leap 15.5
main/oss
sudo 1.9.12p1 Potentially vulnerable System/Base -
openSUSE Leap 15.5
main/oss
sudo 1.9.12p1 Potentially vulnerable System/Base -
openSUSE Tumbleweed
src-oss
sudo 1.9.13p3 Potentially vulnerable System/Base -
OpenWrt 17.01 x86_64
packages
sudo 1.8.14p3 Potentially vulnerable admin mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
sudo 1.8.28p1 Potentially vulnerable admin fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
packages
sudo 1.8.28p1 Potentially vulnerable admin fallback-mnt-openwrt@repology
OpenWrt 21.02 x86_64
packages
sudo 1.9.5p2 Potentially vulnerable admin ardeleanalex@gmail.com
OpenWrt 22.03 x86_64
packages
sudo 1.9.10 Potentially vulnerable admin ardeleanalex@gmail.com
Parabola
core
sudo 1.9.13.p3 Potentially vulnerable - -
Pardus 17
main
sudo 1.8.19p1 Potentially vulnerable admin bdale@gag.com
Pardus 19
main
sudo 1.8.27 Potentially vulnerable admin bdale@gag.com
Pardus 19
updates/main
sudo 1.8.27 Potentially vulnerable admin bdale@gag.com
Pardus 21
main
sudo 1.9.5p2 Potentially vulnerable admin sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Pardus 21
updates/main
sudo 1.9.5p2 Potentially vulnerable admin sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Parrot
parrot/main
sudo 1.9.5p2 Potentially vulnerable admin sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Parrot
parrot-updates/main
sudo 1.9.5p2 Potentially vulnerable admin sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
PCLinuxOS sudo 1.9.10 Potentially vulnerable System/Base -
Pisi Linux
main
sudo 1.9.13_p3 Potentially vulnerable app:console admins@pisilinux.org
pkgsrc current security/sudo 1.9.13p3 Potentially vulnerable security pkgsrc-users@netbsd.org
PLD Linux sudo 1.9.13p1 Potentially vulnerable - -
PureOS Amber sudo 1.8.27 Potentially vulnerable misc bdale@gag.com
PureOS landing sudo 1.9.5p2 Potentially vulnerable misc sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Raspbian Oldstable
main
sudo 1.8.27 Potentially vulnerable admin bdale@gag.com
Raspbian Stable
main
sudo 1.9.5p2 Potentially vulnerable admin sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Raspbian Testing
main
sudo 1.9.13p3 Potentially vulnerable admin sudo@packages.debian.org, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Ravenports sudo 1.9.13p3 Potentially vulnerable security fallback-mnt-ravenports@repology
Rocky Linux 8
BaseOS
sudo 1.8.29 Potentially vulnerable Applications/System infrastructure@rockylinux.org
Rocky Linux 8
BaseOS
sudo 1.8.29 Potentially vulnerable Applications/System infrastructure@rockylinux.org
Rocky Linux 9
AppStream
sudo 1.9.5p2 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
BaseOS
sudo 1.9.5p2 Potentially vulnerable Unspecified releng@rockylinux.org
Rosa 2014.1
main/updates
sudo 1.8.21p2 Potentially vulnerable - -
Rosa 2014.1
main/release
sudo 1.8.8 Potentially vulnerable - -
Rosa 2016.1
main/updates
sudo 1.8.21p2 Potentially vulnerable - -
Rosa 2016.1
main/release
sudo 1.8.19p2 Potentially vulnerable - -
Rosa 2021.1
main/release
sudo 1.9.8p2 Potentially vulnerable System/Base m.novosyolov@rosalinux.ru
Rosa Server 6.9
base/release
sudo 1.8.6p3 Potentially vulnerable Applications/System andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
sudo 1.8.6p3 Potentially vulnerable Applications/System andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
sudo 1.8.6p3 Potentially vulnerable Applications/System andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
sudo 1.8.6p7 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
sudo 1.8.19p2 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
sudo 1.8.6p7 Potentially vulnerable Applications/System alex2048@mail.ru
Scientific Linux 7.x sudo 1.8.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.19p2 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.19p2 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.19p2 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.19p2 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Slackware 14.2
patches
sudo 1.9.13p3 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
sudo 1.8.16 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
patches
sudo 1.9.13p3 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
sudo 1.9.9 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
sudo 1.9.13p3 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
patches
sudo 1.9.13p3 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
sudo 1.8.16 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
patches
sudo 1.9.13p3 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
sudo 1.9.9 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
sudo 1.9.13p3 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
patches
sudo 1.9.13p3 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
sudo 1.8.16 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
patches
sudo 1.9.13p3 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
sudo 1.9.9 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking sudo 1.9.5p2 Potentially vulnerable security erjo@slitaz.org
SliTaz Cooking sudo-lang 1.9.5p2 Potentially vulnerable security erjo@slitaz.org
SliTaz Cooking sudo-pam 1.9.5p2 Potentially vulnerable security erjo@slitaz.org
SliTaz Next sudo 1.8.20p2 Potentially vulnerable security devel@slitaz.org
SliTaz Next sudo-dev 1.8.20p2 Potentially vulnerable development devel@slitaz.org
SliTaz Next sudo-pam 1.8.20p2 Potentially vulnerable security devel@slitaz.org
SliTaz Next sudo-pam-dev 1.8.20p2 Potentially vulnerable security devel@slitaz.org
SliTaz Next sudo 1.8.20p2 Potentially vulnerable security devel@slitaz.org
SliTaz Next sudo-dev 1.8.20p2 Potentially vulnerable development devel@slitaz.org
SliTaz Next sudo-pam 1.8.20p2 Potentially vulnerable security devel@slitaz.org
SliTaz Next sudo-pam-dev 1.8.20p2 Potentially vulnerable security devel@slitaz.org
T2 SDE sudo 1.9.13p2 Potentially vulnerable extra/shell t2@t2-project.org
Trisquel 6.0
toutatis/main
sudo 1.8.3p1 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 6.0
toutatis-updates/main
sudo 1.8.3p1 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos-updates/main
sudo 1.8.9p5 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos/main
sudo 1.8.9p5 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas/main
sudo 1.8.16 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas-updates/main
sudo 1.8.16 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 9.0
etiona/main
sudo 1.8.21p2 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 9.0
etiona-updates/main
sudo 1.8.21p2 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 9.0
etiona-updates/main
sudo 1.8.21p2 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia-updates/main
sudo 1.8.31 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia-updates/main
sudo 1.8.31 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia/main
sudo 1.8.31 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
UBI 8
baseos
sudo 1.8.29 Potentially vulnerable Applications/System -
Ubuntu 14.04
trusty/main
sudo 1.8.9p5 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty-updates/main
sudo 1.8.9p5 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial/main
sudo 1.8.16 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial-updates/main
sudo 1.8.16 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic/main
sudo 1.8.21p2 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic-updates/main
sudo 1.8.21p2 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal-updates/main
sudo 1.8.31 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/main
sudo 1.8.31 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 22.04
jammy/main
sudo 1.9.9 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Ubuntu 22.04
jammy-updates/main
sudo 1.9.9 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Ubuntu 22.10
kinetic/main
sudo 1.9.11p3 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Ubuntu 22.10
kinetic-updates/main
sudo 1.9.11p3 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Ubuntu 23.04
lunar/main
sudo 1.9.13p1 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com, bengen@debian.org, mh+debian-packages@zugschlus.de, wagner@debian.org, waldi@debian.org
Void Linux x86_64
x86_64
sudo 1.9.13p2 Potentially vulnerable - gottox@voidlinux.org
Wikidata sudo 1.9.13p2 Potentially vulnerable - -
yiffOS Knot sudo 1.9.9 Potentially vulnerable - evie@eviee.gay