Versions Packages Information History CVEs Related Badges Report

Versions for sudo

353 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
system
sudo-dev 1.8.28 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
sudo-lang 1.8.28 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
sudo-dbg 1.8.28 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
sudo-doc 1.8.28 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
sudo 1.8.28 Potentially vulnerable - horst@adelielinux.org
AIX Open Source Packages sudo 1.8.27 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.26 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.25p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.25 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.24 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.23 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.22 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.21p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.21p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.21 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.20p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.20p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.20 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.19p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.19p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.19 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.18p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.18p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.18 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.17p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.17 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.16 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.15 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.15 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.14p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.14p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.14p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.14 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.13 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.12 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.11p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.11p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.11p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.11 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.11 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.10p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.10p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.10p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.10p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.10 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.9p5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.9p5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.9p4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.9p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.9p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.9p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.9 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.8 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.7 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.7 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p8 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p8 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p7 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p6 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.6 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.5p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.5p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.5p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.4p5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.4p4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.4p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.4p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.3p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.3p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.1p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.1p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.8.0 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p9 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p8 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p7 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p6 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.10 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.9p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.9 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.8p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.8p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.8 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.7 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.6p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.6p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.6 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.4p6 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.4p5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.4p4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.4p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2p8 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2p7 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2p5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2p4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2p3 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2p2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2p1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.1 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.0 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.0rc5 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7.0rc2 Potentially vulnerable - -
AIX Open Source Packages sudo 1.7b4 Potentially vulnerable - -
AIX Open Source Packages sudo 1.6.9p23 Potentially vulnerable - -
AIX Open Source Packages sudo 1.6.9p20 Potentially vulnerable - -
AIX Open Source Packages sudo 1.6.9p18 Potentially vulnerable - -
AIX Open Source Packages sudo 1.6.9p17 Potentially vulnerable - -
AIX Open Source Packages sudo 1.6.9p16 Potentially vulnerable - -
AIX Open Source Packages sudo 1.6.9p15 Potentially vulnerable - -
AIX Open Source Packages sudo 1.6.9p14 Potentially vulnerable - -
Alpine Linux 3.8
main
sudo-dev 1.8.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
sudo 1.8.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
sudo-doc 1.8.23 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
sudo-dev 1.8.25_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
sudo-doc 1.8.25_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
sudo 1.8.25_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
sudo-dev 1.8.27 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
sudo-doc 1.8.27 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
sudo 1.8.27 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
sudo-doc 1.8.31 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
sudo-dev 1.8.31 - ncopa@alpinelinux.org
Alpine Linux 3.11
main
sudo 1.8.31 - ncopa@alpinelinux.org
Alpine Linux Edge
main
sudo 1.9.0 - ncopa@alpinelinux.org
Alpine Linux Edge
main
sudo-doc 1.9.0 - ncopa@alpinelinux.org
Alpine Linux Edge
main
sudo-dev 1.9.0 - ncopa@alpinelinux.org
ALT Linux p9 sudo 1.8.28 Potentially vulnerable System/Base sin@altlinux.org
ALT Sisyphus sudo 1.8.28 Potentially vulnerable System/Base sin@altlinux.org
Amazon Linux 1
main
sudo 1.8.6p3 Potentially vulnerable Applications/System -
Amazon Linux 1
updates
sudo 1.8.6p3 Potentially vulnerable Applications/System -
Amazon Linux 1
updates
sudo 1.8.6p3 Potentially vulnerable Applications/System -
Amazon Linux 1
updates
sudo 1.8.6p3 Potentially vulnerable Applications/System -
Amazon Linux 2 sudo 1.8.23 Potentially vulnerable Applications/System -
Amazon Linux 2 sudo 1.8.23 Potentially vulnerable Applications/System -
Amazon Linux 2 sudo 1.8.19p2 Potentially vulnerable Applications/System -
Amazon Linux 2 sudo 1.8.19p2 Potentially vulnerable Applications/System -
AOSC sudo 1.8.31 admin fallback-mnt-aosc@repology
Arch
core
sudo 1.9.0 - -
AUR sudo-hg r11370.d568dc923c7d - chocobo1@aur
Astra Orel Stable
main
sudo 1.8.19p1 Potentially vulnerable admin bdale@gag.com
Astra Orel Current
main
sudo 1.8.19p1 Potentially vulnerable admin bdale@gag.com
Ataraxia Linux sudo 1.9.0 admin nagakamira@gmail.com
Carbs Linux
extra
sudo 1.9.0 - cem@ckyln.com
CentOS 6
os
sudo 1.8.6p3 Potentially vulnerable Applications/System -
CentOS 6
updates
sudo 1.8.6p3 Potentially vulnerable Applications/System -
CentOS 6
updates
sudo 1.8.6p3 Potentially vulnerable Applications/System -
CentOS 7
os
sudo 1.8.23 Potentially vulnerable Applications/System -
CentOS 8
BaseOS
sudo 1.8.25p1 Potentially vulnerable Applications/System bugs@centos.org
Chakra
core
sudo 1.8.31 - -
Chocolatey Sudo 1.1.2 Potentially vulnerable - -
CRUX 3.2
core
sudo 1.8.19p2 Potentially vulnerable - -
CRUX 3.3
core
sudo 1.8.23 Potentially vulnerable - -
CRUX 3.4
core
sudo 1.8.27 Potentially vulnerable - -
CRUX 3.5
core
sudo 1.9.0 - -
Debian Oldstable
oldstable/main
sudo 1.8.19p1 Potentially vulnerable admin bdale@gag.com
Debian Stable
stable/main
sudo 1.8.27 Potentially vulnerable admin bdale@gag.com
Debian Testing
testing/main
sudo 1.9.0 admin bdale@gag.com
Debian Unstable
main
sudo 1.9.0 admin bdale@gag.com
Deepin
main
sudo 1.8.23 Potentially vulnerable admin bdale@gag.com
Devuan 1.0 (Jessie)
jessie/main
sudo 1.8.10p3 Potentially vulnerable admin bdale@gag.com
Devuan 2.0 (ASCII)
ascii/main
sudo 1.8.19p1 Potentially vulnerable admin bdale@gag.com
Devuan 3.0 (Beowulf)
beowulf/main
sudo 1.8.27 Potentially vulnerable admin bdale@gag.com
Devuan 4.0 (Chimaera)
chimaera/main
sudo 1.9.0 admin bdale@gag.com
Devuan Unstable
unstable/main
sudo 1.9.0 admin bdale@gag.com
distri sudo 1.8.31p1 - -
DPorts security/sudo 1.8.31p1 security garga@freebsd.org
Entware
aarch64-k3.10
sudo 1.8.31 admin fallback-mnt-entware@repology
Entware
armv5sf-k3.2
sudo 1.8.31 admin fallback-mnt-entware@repology
Entware
armv7sf-k2.6
sudo 1.8.31 admin fallback-mnt-entware@repology
Entware
armv7sf-k3.2
sudo 1.8.31 admin fallback-mnt-entware@repology
Entware
mipselsf-k3.4
sudo 1.8.31 admin fallback-mnt-entware@repology
Entware
mipssf-k3.4
sudo 1.8.31 admin fallback-mnt-entware@repology
Entware
x64-k3.2
sudo 1.8.31 admin fallback-mnt-entware@repology
Exherbo
arbor
app-admin/sudo 1.8.31_p1 app-admin fallback-mnt-exherbo@repology
Fedora 26
updates
sudo 1.8.21p2 Potentially vulnerable Applications/System -
Fedora 26
release
sudo 1.8.20p2 Potentially vulnerable Applications/System -
Fedora 27
updates
sudo 1.8.23 Potentially vulnerable Applications/System -
Fedora 27
release
sudo 1.8.21p2 Potentially vulnerable Applications/System -
Fedora 28
updates
sudo 1.8.23 Potentially vulnerable Applications/System -
Fedora 28
release
sudo 1.8.22 Potentially vulnerable Applications/System -
Fedora 29
updates
sudo 1.8.28 Potentially vulnerable Applications/System -
Fedora 29
release
sudo 1.8.23 Potentially vulnerable Applications/System -
Fedora 30
updates
sudo 1.8.31p1 Unspecified -
Fedora 30
release
sudo 1.8.27 Potentially vulnerable Unspecified -
Fedora 31
updates
sudo 1.9.0 Unspecified -
Fedora 31
release
sudo 1.8.28 Potentially vulnerable Unspecified -
Fedora 32
release
sudo 1.9.0 Unspecified -
Fedora Rawhide sudo 1.9.0 Unspecified -
FreeBSD Ports security/sudo 1.8.31p1 security garga@freebsd.org
Funtoo 1.4
core-kit
app-admin/sudo 1.8.28_p1 Potentially vulnerable app-admin base-system@gentoo.org
Gentoo app-admin/sudo 9999 app-admin base-system@gentoo.org
Gentoo app-admin/sudo 1.9.0 app-admin base-system@gentoo.org
Gentoo app-admin/sudo 1.8.31_p1 app-admin base-system@gentoo.org
Gentoo app-admin/sudo 1.8.31 app-admin base-system@gentoo.org
GNU Guix sudo 1.9.0 - -
GoboLinux Sudo 1.8.31p1 - -
HP-UX 11.31
hppa_32
sudo 1.9.0 - -
HP-UX 11.31
ia64_64
sudo 1.9.0 - -
HP-UX 11.31
hppa_32
sudo 1.8.20p2 Potentially vulnerable - -
HP-UX 11.31
ia64_32
sudo 1.8.20p2 Potentially vulnerable - -
Hyperbola
core
sudo 1.8.31.p1 - -
Kali Linux Rolling
main
sudo 1.9.0 admin bdale@gag.com
KaOS
core
sudo 1.9.0 - demm@kaosx.us
KISS Linux Main
extra
sudo 1.9.0 - dylan.araps@gmail.com
Kwort 4.3.2 sudo 1.8.22 Potentially vulnerable - -
Kwort 4.3.3 sudo 1.8.27 Potentially vulnerable - -
Kwort 4.3.4 sudo 1.9.0 - -
LiGurOS 20.1
nokit
app-admin/sudo 9999 app-admin base-system@gentoo.org
LiGurOS 20.1
nokit
app-admin/sudo 1.9.0 app-admin base-system@gentoo.org
LiGurOS 20.1
nokit
app-admin/sudo 1.8.31_p1 app-admin base-system@gentoo.org
LiGurOS 20.1
nokit
app-admin/sudo 1.8.31 app-admin base-system@gentoo.org
LiGurOS 20.7
nokit
app-admin/sudo 9999 app-admin base-system@gentoo.org
LiGurOS 20.7
nokit
app-admin/sudo 1.9.0 app-admin base-system@gentoo.org
LiGurOS 20.7
nokit
app-admin/sudo 1.8.31_p1 app-admin base-system@gentoo.org
LiGurOS 20.7
nokit
app-admin/sudo 1.8.31 app-admin base-system@gentoo.org
MacPorts sudo 1.9.0 sysutils mps@macports, schamschula@github
Mageia 6
core/release
sudo 1.8.20p2 Potentially vulnerable System/Base -
Mageia 7
core/updates
sudo 1.8.28 Potentially vulnerable System/Base -
Mageia 7
core/updates
sudo 1.8.28 Potentially vulnerable System/Base -
Mageia 7
core/release
sudo 1.8.27 Potentially vulnerable System/Base -
Mageia Cauldron
core/release
sudo 1.9.0 System/Base -
Manjaro Stable
core
sudo 1.8.31.p1 - -
Manjaro Testing
core
sudo 1.9.0 - -
Manjaro Unstable
core
sudo 1.9.0 - -
nixpkgs stable sudo 1.8.31 - edolstra+nixpkgs@gmail.com
nixpkgs unstable sudo 1.8.31p1 - edolstra+nixpkgs@gmail.com
OpenBSD Ports security/sudo 1.8.31 security millert@openbsd.org
OpenBSD Ports security/sudo 1.8.31 security millert@openbsd.org
OpenBSD Ports security/sudo 1.8.31 security millert@openbsd.org
openEuler 20.03
source
sudo 1.8.27 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
sudo 1.8.31 Applications/System Utilities -
OpenIndiana packages
hipster
sudo 1.8.30 Applications/System Utilities -
OpenIndiana packages
hipster
sudo 1.8.29 Potentially vulnerable Applications/System Utilities -
OpenIndiana packages
hipster
sudo 1.8.28.1 Potentially vulnerable Applications/System Utilities -
OpenIndiana packages
hipster
sudo 1.8.28 Potentially vulnerable Applications/System Utilities -
OpenIndiana packages
hipster
sudo 1.8.27 Potentially vulnerable Applications/System Utilities -
OpenMandriva 3.0
main/updates
sudo 1.8.23 Potentially vulnerable System/Base tpgxyz@gmail.com
OpenMandriva 3.0
main/release
sudo 1.8.13 Potentially vulnerable System/Base tpgxyz@gmail.com
OpenMandriva 4.0
main/release
sudo 1.8.27 Potentially vulnerable System/Base bero@lindev.ch
OpenMandriva 4.1
main/release
sudo 1.8.30 System/Base nobodydead@gmail.com
OpenMandriva Rolling
main/release
sudo 1.8.31 System/Base bero@lindev.ch
OpenMandriva Cooker
main/release
sudo 1.9.0 System/Base bero@lindev.ch
OpenPKG sudo 1.9.0 ShellUtils -
openSUSE Leap 42.3
main/oss
sudo 1.8.20p2 Potentially vulnerable System/Base -
openSUSE Leap 42.3
updates/oss
sudo 1.8.20p2 Potentially vulnerable System/Base -
openSUSE Leap 15.0
main/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.0
updates/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.1
main/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.1
updates/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Leap 15.2
main/oss
sudo 1.8.22 Potentially vulnerable System/Base -
openSUSE Tumbleweed sudo 1.9.0 System/Base -
OpenWrt 17.01 x86_64
packages
sudo 1.8.14p3 Potentially vulnerable admin mail.gery@gmail.com
OpenWrt 18.06 x86_64
packages
sudo 1.8.28p1 Potentially vulnerable admin fallback-mnt-openwrt@repology
OpenWrt 19.07 x86_64
packages
sudo 1.8.28p1 Potentially vulnerable admin fallback-mnt-openwrt@repology
Parabola
core
sudo 1.9.0 - -
Pardus
main
sudo 1.8.19p1 Potentially vulnerable admin bdale@gag.com
Parrot
main
sudo 1.8.31p1 admin bdale@gag.com
PCLinuxOS sudo 1.8.31p1 System/Base -
Pisi Linux
main
sudo 1.9.0 app:console admins@pisilinux.org
pkgsrc current security/sudo 1.8.31p1 security pkgsrc-users@netbsd.org
PLD Linux sudo 1.8.31 - -
PureOS Amber sudo 1.8.27 Potentially vulnerable misc bdale@gag.com
PureOS landing sudo 1.9.0 misc bdale@gag.com
Raspbian Oldstable
main
sudo 1.8.19p1 Potentially vulnerable admin bdale@gag.com
Raspbian Stable
main
sudo 1.8.27 Potentially vulnerable admin bdale@gag.com
Raspbian Testing
main
sudo 1.9.0 admin bdale@gag.com
Ravenports sudo 1.9.0 security fallback-mnt-ravenports@repology
Rosa 2014.1
main/updates
sudo 1.8.21p2 Potentially vulnerable - -
Rosa 2014.1
main/release
sudo 1.8.8 Potentially vulnerable - -
Rosa 2016.1
main/testing
sudo 1.8.21p2 Potentially vulnerable - -
Rosa 2016.1
main/updates
sudo 1.8.21p2 Potentially vulnerable - -
Rosa 2016.1
main/release
sudo 1.8.19p2 Potentially vulnerable - -
Rosa 2019.1
main/release
sudo 1.8.21p2 Potentially vulnerable System/Base m.novosyolov@rosalinux.ru
Rosa Server 6.9
base/release
sudo 1.8.6p3 Potentially vulnerable Applications/System andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
sudo 1.8.6p3 Potentially vulnerable Applications/System andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
sudo 1.8.6p3 Potentially vulnerable Applications/System andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
sudo 1.8.6p7 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
sudo 1.8.19p2 Potentially vulnerable Applications/System alex2048@mail.ru
Rosa Server 7.5
base/release
sudo 1.8.6p7 Potentially vulnerable Applications/System alex2048@mail.ru
Scientific Linux 7.x sudo 1.8.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.23 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.19p2 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.19p2 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.19p2 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.19p2 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scientific Linux 7.x sudo 1.8.6p7 Potentially vulnerable Applications/System -
Scoop
main
sudo 0.2020.01.26 Potentially vulnerable - -
Slackware 14.2
patches
sudo 1.8.31p1 - volkerdi@slackware.com
Slackware 14.2
slackware
sudo 1.8.16 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
sudo 1.9.0 - volkerdi@slackware.com
Slackware64 14.2
patches
sudo 1.8.31p1 - volkerdi@slackware.com
Slackware64 14.2
slackware64
sudo 1.8.16 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
sudo 1.9.0 - volkerdi@slackware.com
Slackwarearm 14.2
patches
sudo 1.8.31p1 - volkerdi@slackware.com
Slackwarearm 14.2
slackware
sudo 1.8.16 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm current
slackware
sudo 1.9.0 - volkerdi@slackware.com
SliTaz Cooking sudo 1.8.31 security erjo@slitaz.org
SliTaz Next sudo 1.8.20p2 Potentially vulnerable security devel@slitaz.org
SliTaz Next sudo-dev 1.8.20p2 Potentially vulnerable development devel@slitaz.org
SliTaz Next sudo-pam 1.8.20p2 Potentially vulnerable security devel@slitaz.org
SliTaz Next sudo-pam-dev 1.8.20p2 Potentially vulnerable security devel@slitaz.org
Solus sudo 1.8.31_p1 system.base pyu@riseup.net
Solus sudo-dbginfo 1.8.31_p1 debug pyu@riseup.net
Solus sudo-devel 1.8.31_p1 programming.devel pyu@riseup.net
T2 SDE sudo 1.8.31 extra/shell t2@t2-project.org
Trisquel 6.0
toutatis/main
sudo 1.8.3p1 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 6.0
toutatis-updates/main
sudo 1.8.3p1 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos/main
sudo 1.8.9p5 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 7.0
belenos-updates/main
sudo 1.8.9p5 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas/main
sudo 1.8.16 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 8.0
flidas-updates/main
sudo 1.8.16 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 12.04
precise/main
sudo 1.8.3p1 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 12.04
precise-updates/main
sudo 1.8.3p1 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty-updates/main
sudo 1.8.9p5 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty/main
sudo 1.8.9p5 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial/main
sudo 1.8.16 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial-updates/main
sudo 1.8.16 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic/main
sudo 1.8.21p2 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 18.04
bionic-updates/main
sudo 1.8.21p2 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 19.10
eoan/main
sudo 1.8.27 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 19.10
eoan-updates/main
sudo 1.8.27 Potentially vulnerable admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/main
sudo 1.8.31 admin ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.10
groovy/main
sudo 1.9.0 admin ubuntu-devel-discuss@lists.ubuntu.com
Void Linux x86_64
x86_64
sudo 1.9.0 - gottox@voidlinux.org
Wikidata sudo 1.8.29 Potentially vulnerable - -

Absent in repositories

  • antiX-16
  • antiX-17
  • antiX-19
  • Arch Testing
  • BlackArch
  • BlackBox 6
  • BlackBox 7
  • Buckaroo
  • BunsenLabs Hydrogen
  • BunsenLabs Hydrogen/Jessie Backports
  • BunsenLabs Helium
  • BunsenLabs Helium/Stretch Backports
  • Calculate
  • Chakra Staging
  • Chakra Testing
  • ConanCenter
  • CPAN
  • MetaCPAN
  • CRAN
  • crates.io
  • Cygwin
  • Deb Multimedia Unstable
  • Debian Stable Backports
  • Debian Experimental
  • DistroWatch.com
  • ELRepo el7
  • ELRepo el7 Testing
  • EPEL 6
  • EPEL 7
  • EPEL 8
  • F-Droid
  • freshcode.club
  • Gentoo overlay GURU
  • Gentoo overlay Pentoo
  • GNU Elpa
  • Hackage
  • HaikuPorts master
  • Homebrew
  • Homebrew Casks
  • Homebrew tap Brewsci/bio
  • just-install
  • KaOS Build
  • KDE neon Dev Stable
  • KDE neon Dev Unstable
  • KDE neon Experimental
  • KDE neon User
  • KDE neon User LTS
  • KISS Linux Community
  • Libregamewiki
  • Linux Mint 17
  • Linux Mint 17.1
  • Linux Mint 17.2
  • Linux Mint 17.3
  • Linux Mint 18
  • Linux Mint 18.1
  • Linux Mint 18.2
  • Linux Mint 18.3
  • Linux Mint 19
  • Linux Mint 19.1
  • Linux Mint 19.2
  • Linux Mint 19.3
  • Linuxbrew
  • LuaRocks
  • Maemo Fremantle
  • MELPA
  • MSYS2 mingw
  • MSYS2 msys2
  • MX Linux MX-15
  • MX Linux MX-15 Testing
  • MX Linux MX-16
  • MX Linux MX-17
  • MX Linux MX-17 Testing
  • MX Linux MX-19
  • MX Linux MX-19 Testing
  • NeuroDebian data
  • NeuroDebian Debian 8
  • NeuroDebian Debian 9
  • NeuroDebian Debian 10
  • NeuroDebian Debian Unstable
  • NeuroDebian Ubuntu 14.04
  • NeuroDebian Ubuntu 16.04
  • NeuroDebian Ubuntu 18.04
  • NeuroDebian Ubuntu 19.04
  • Npackd Stable
  • Npackd Stable64
  • Npackd Unstable
  • openSUSE Education Tumbleweed
  • openSUSE Emulators Tumbleweed
  • openSUSE Games Tumbleweed
  • openSUSE Graphics Tumbleweed
  • openSUSE Hardware:SDR Tumbleweed
  • openSUSE Multimedia:Apps Tumbleweed
  • openSUSE Multimedia:Libs Tumbleweed
  • openSUSE Network Tumbleweed
  • openSUSE Science Tumbleweed
  • openSUSE Security Tumbleweed
  • OS4Depot
  • PackMan openSUSE Leap 42.3
  • PackMan openSUSE Leap 15.0
  • PackMan openSUSE Leap 15.1
  • PackMan openSUSE Leap 15.2
  • PackMan openSUSE Tumbleweed
  • PackMan SLE 12
  • PackMan SLE 15
  • Parabola Testing
  • Pisi Linux Contrib
  • ReactOS rapps
  • RPM Fusion EL 6
  • RPM Fusion EL 7
  • RPM Fusion EL 8
  • RPM Fusion Fedora 28
  • RPM Fusion Fedora 29
  • RPM Fusion Fedora 30
  • RPM Fusion Fedora 31
  • RPM Fusion Fedora Rawhide
  • RPM Sphere
  • RubyGems
  • Sabayon
  • Sabayon for-gentoo
  • Salix 14.2
  • Siduction
  • Siduction Experimental
  • SlackBuilds
  • Sparky Stable
  • Sparky Testing
  • Stackage LTS Haskell
  • Stackage Nightly
  • Tails stable
  • Tails devel
  • Termux
  • Trisquel 6.0 backports
  • Trisquel 7.0 backports
  • Trisquel 8.0 backports
  • Ubuntu 12.04 Backports
  • Ubuntu 14.04 Backports
  • Ubuntu 16.04 Backports
  • Ubuntu 18.04 Backports
  • Ubuntu 19.10 Backports
  • Ubuntu 19.10 Proposed
  • Ubuntu 20.04 Proposed
  • Ubuntu 20.10 Proposed
  • UnitedRPMs Fedora 30
  • UnitedRPMs Fedora 31
  • UnitedRPMs Fedora 32
  • UnitedRPMs Fedora 33
  • Vcpkg
  • Whonix
  • Whonix Developers
  • winget
  • YACP