forked from TH3xACE/SUDO_KILLER
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcve.sudo2.txt
76 lines (38 loc) · 31.5 KB
/
cve.sudo2.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
CVE-2016-7076 + https://www.sudo.ws/alerts/noexec_wordexp.html https://usn.ubuntu.com/3968-1/ https://rhn.redhat.com/errata/RHSA-2016-2872.html http://www.securityfocus.com/bid/95778 https://security.netapp.com/advisory/ntap-20181127-0002/ https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7076 + 1.8.0 1.8.1 1.8.1p1 1.8.1p2 1.8.2 1.8.3 1.8.3p1 1.8.3p2 1.8.4 1.8.4p5 1.8.4p2 1.8.4p3 1.8.4p5 1.8.5 1.8.5p3 1.8.6p8 1.8.7 1.8.8 1.8.9 1.8.9p1 1.8.9p2 1.8.9p3 1.8.9p4 1.8.9p5 1.8.10 1.8.10p1 1.8.10p2 1.8.11 1.8.11p1 1.8.11p2 1.8.12 1.8.13 1.8.14 1.8.14p1 1.8.14p2 1.8.14p3 1.8.15 1.8.16 1.8.17 1.8.17p1 1.8.18 1.8.18p1
CVE-2016-7032 + https://bugzilla.redhat.com/show_bug.cgi?id=1372830 https://www.sudo.ws/alerts/noexec_bypass.html http://www.securityfocus.com/bid/95776 https://rhn.redhat.com/errata/RHSA-2016-2872.html + 1.6.8 1.6.9 1.7.0 1.7.1 1.7.2 1.7.3 1.7.4 1.7.5 1.7.6 1.7.7 1.7.8 1.7.9 1.7.10 1.8.0 1.8.1 1.8.2 1.8.3 1.8.4 1.8.5 1.8.6 1.8.7 1.8.8 1.8.9 1.8.10 1.8.11 1.8.12 1.8.13 1.8.14
CVE-2014-0106 + https://www.ubuntu.com/usn/USN-2146-1 https://support.apple.com/kb/HT205031 http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/65997 https://www.sudo.ws/sudo/alerts/env_add.html https://www.openwall.com/lists/oss-security/2014/03/06/2 https://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html https://rhn.redhat.com/errata/RHSA-2014-0266.html http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00003.html + 1.6.9 1.6.9p20 1.6.9p21 1.6.9p22 1.6.9p23 1.7.0 1.7.1 1.7.2p3 1.7.2p4 1.7.2p5 1.7.2 1.7.2p6 1.7.2p1 1.7.2p7 1.7.2p2 1.7.3b1 1.7.4p5 1.7.4 1.7.4p6 1.7.4p1 1.7.4p2 1.7.4p3 1.7.4p4 1.7.5 1.7.6p2 1.7.6 1.7.6p1 1.7.7 1.7.8 1.7.8p1 1.7.8p2 1.7.9p1 1.7.9 1.7.10p4 1.7.10p10 1.7.10p5 1.7.10 1.7.10p6 1.7.10p1 1.7.10p7 1.7.10p2 1.7.10p8 1.7.10p3 1.7.10p9 1.8.0 1.8.1 1.8.1p1 1.8.1p2 1.8.2 1.8.3 1.8.3p1 1.8.3p2 1.8.4p1 1.8.4p2 1.8.4p3 1.8.4p4 1.8.4p5 1.8.4
CVE-2013-2777 + https://support.apple.com/kb/HT205031 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440 https://www.sudo.ws/repos/sudo/rev/2f3225a2a4a4 https://www.sudo.ws/repos/sudo/rev/bfa23f089bba https://www.sudo.ws/sudo/alerts/tty_tickets.html https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023 https://bugzilla.redhat.com/show_bug.cgi?id=916365 https://exchange.xforce.ibmcloud.com/vulnerabilities/82453 https://www.debian.org/security/2013/dsa-2642 https://www.openwall.com/lists/oss-security/2013/02/27/31 http://www.securityfocus.com/bid/58207 https://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html https://rhn.redhat.com/errata/RHSA-2013-1701.html https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839 + 1.3.5 1.6 1.6.1 1.6.2 1.6.2p3 1.6.3 1.6.3p7 1.6.4 1.6.4p2 1.6.5 1.6.6 1.6.7p5 1.6.7 1.6.8 1.6.8p12 1.6.9 1.6.9p22 1.6.9p21 1.6.9p23 1.6.9p20 1.7.0 1.7.1 1.7.2p2 1.7.2p3 1.7.2 1.7.2p6 1.7.2p1 1.7.2p5 1.7.2p7 1.7.2p4 1.7.3b1 1.7.4p6 1.7.4p2 1.7.4p3 1.7.4 1.7.4p1 1.7.4p4 1.7.4p5 1.7.5 1.7.6p2 1.7.6p1 1.7.6 1.7.7 1.7.8p2 1.7.8p1 1.7.8 1.7.9p1 1.7.9 1.7.10p3 1.7.10p4 1.7.10p1 1.7.10 1.7.10p2 1.8.0 1.8.1p2 1.8.1 1.8.1p1 1.8.2 1.8.3 1.8.3p1 1.8.3p2 1.8.4 1.8.4p1 1.8.4p2 1.8.4p3 1.8.4p4 1.8.4p5 1.8.5 1.8.6p4 1.8.6p5 1.8.6 1.8.6p1 1.8.6p2 1.8.6p3
CVE-2013-2776 + https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839 https://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440 https://exchange.xforce.ibmcloud.com/vulnerabilities/82453 https://www.sudo.ws/repos/sudo/rev/0c0283d1fafa https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023 https://bugzilla.redhat.com/show_bug.cgi?id=916365 https://www.sudo.ws/sudo/alerts/tty_tickets.html http://www.securityfocus.com/bid/58207 https://support.apple.com/kb/HT205031 https://www.sudo.ws/repos/sudo/rev/049a12a5cc14 http://www.securityfocus.com/bid/62741 https://rhn.redhat.com/errata/RHSA-2013-1701.html https://www.debian.org/security/2013/dsa-2642 https://www.openwall.com/lists/oss-security/2013/02/27/31 https://rhn.redhat.com/errata/RHSA-2013-1353.html + 1.3.5 1.6 1.6.1 1.6.2p3 1.6.2 1.6.3 1.6.3p7 1.6.4 1.6.4p2 1.6.5 1.6.6 1.6.7p5 1.6.7 1.6.8 1.6.8p12 1.6.9p23 1.6.9p20 1.6.9 1.6.9p22 1.6.9p21 1.7.0 1.7.1 1.7.2p3 1.7.2 1.7.2p6 1.7.2p1 1.7.2p5 1.7.2p7 1.7.2p4 1.7.2p2 1.7.3b1 1.7.4p3 1.7.4 1.7.4p1 1.7.4p4 1.7.4p5 1.7.4p6 1.7.4p2 1.7.5 1.7.6p2 1.7.6p1 1.7.6 1.7.7 1.7.8p2 1.7.8p1 1.7.8 1.7.9 1.7.9p1 1.7.10p2 1.7.10p3 1.7.10p4 1.7.10p5 1.7.10 1.7.10p1 1.8.0 1.8.1p1 1.8.1p2 1.8.1 1.8.2 1.8.3 1.8.3p1 1.8.3p2 1.8.4p5 1.8.4 1.8.4p1 1.8.4p2 1.8.4p3 1.8.4p4 1.8.5 1.8.6p1 1.8.6p2 1.8.6p3 1.8.6p4 1.8.6p5 1.8.6
CVE-2013-1776 + https://exchange.xforce.ibmcloud.com/vulnerabilities/82453 https://support.apple.com/kb/HT205031 https://bugzilla.redhat.com/show_bug.cgi?id=916365 https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023 https://www.sudo.ws/sudo/alerts/tty_tickets.html https://www.sudo.ws/repos/sudo/rev/6b22be4d09f0 https://www.sudo.ws/repos/sudo/rev/632f8e028191 http://www.securityfocus.com/bid/58207 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440 http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html https://www.debian.org/security/2013/dsa-2642 https://www.openwall.com/lists/oss-security/2013/02/27/31 https://rhn.redhat.com/errata/RHSA-2013-1353.html https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839 http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html https://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html + 1.3.5 1.6 1.6.1 1.6.2p3 1.6.2 1.6.3 1.6.3p7 1.6.4 1.6.4p2 1.6.5 1.6.6 1.6.7p5 1.6.7 1.6.8 1.6.8p12 1.6.9p23 1.6.9p20 1.6.9 1.6.9p22 1.6.9p21 1.7.0 1.7.1 1.7.2p3 1.7.2 1.7.2p6 1.7.2p1 1.7.2p5 1.7.2p7 1.7.2p4 1.7.2p2 1.7.3b1 1.7.4p6 1.7.4p2 1.7.4p3 1.7.4 1.7.4p1 1.7.4p4 1.7.4p5 1.7.5 1.7.6p2 1.7.6p1 1.7.6 1.7.7 1.7.8p2 1.7.8p1 1.7.8 1.7.9p1 1.7.9 1.7.10 1.8.0 1.8.1 1.8.1p1 1.8.1p2 1.8.2 1.8.3p1 1.8.3p2 1.8.3 1.8.4p3 1.8.4p4 1.8.4p5 1.8.4 1.8.4p1 1.8.4p2 1.8.5
CVE-2013-1775 + https://www.ubuntu.com/usn/USN-1754-1 https://support.apple.com/kb/HT205031 http://www.securityfocus.com/bid/58203 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440 https://www.sudo.ws/repos/sudo/rev/ddf399e3e306 https://www.sudo.ws/repos/sudo/rev/ebd6cc75020f https://www.sudo.ws/sudo/alerts/epoch_ticket.html https://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html https://www.openwall.com/lists/oss-security/2013/02/27/22 http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html https://www.debian.org/security/2013/dsa-2642 https://support.apple.com/kb/HT5880 https://rhn.redhat.com/errata/RHSA-2013-1701.html https://rhn.redhat.com/errata/RHSA-2013-1353.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html https://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html https://www.rapid7.com/db/modules/exploit/osx/local/sudo_password_bypass + 1.6 1.6.1 1.6.2 1.6.2p3 1.6.3 1.6.3p7 1.6.4 1.6.4p2 1.6.5 1.6.6 1.6.7p5 1.6.7 1.6.8 1.6.8p12 1.6.9p23 1.6.9p20 1.6.9p22 1.6.9 1.6.9p21 1.7.0 1.7.1 1.7.2p7 1.7.2p5 1.7.2p6 1.7.2p2 1.7.2p1 1.7.2p3 1.7.2p4 1.7.2 1.7.3b1 1.7.4p5 1.7.4p6 1.7.4p2 1.7.4p3 1.7.4 1.7.4p1 1.7.4p4 1.7.5 1.7.6 1.7.6p1 1.7.6p2 1.7.7 1.7.8 1.7.8p1 1.7.8p2 1.7.9 1.7.9p1 1.7.10p5 1.7.10 1.7.10p6 1.7.10p1 1.7.10p2 1.7.10p3 1.7.10p4 1.8.0 1.8.1 1.8.1p1 1.8.1p2 1.8.2 1.8.3 1.8.3p1 1.8.3p2 1.8.4p1 1.8.4p2 1.8.4p3 1.8.4p4 1.8.4p5 1.8.4 1.8.5 1.8.5p1 1.8.5p2 1.8.5p3 1.8.6p2 1.8.6p3 1.8.6p4 1.8.6p5 1.8.6 1.8.6p6 1.8.6p1
CVE-2012-3440 + https://bugzilla.redhat.com/show_bug.cgi?id=844442 http://www.securityfocus.com/bid/54868 http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html + 1.7.2
CVE-2012-2337 + https://lists.fedoraproject.org/pipermail/package-announce/2012-May/081432.html https://www.suse.com/security/cve/CVE-2012-2337/ https://bugzilla.redhat.com/show_bug.cgi?id=820677 https://www.sudo.ws/sudo/alerts/netmask.html http://www.mandriva.com/security/advisories?name=MDVSA-2012:079 http://www.securitytracker.com/id?1027077 https://secunia.com/advisories/49948 https://www.debian.org/security/2012/dsa-2478 + 1.6 1.6.1 1.6.2 1.6.2p3 1.6.3 1.6.3p7 1.6.4 1.6.4p2 1.6.5 1.6.6 1.6.7 1.6.7p5 1.6.8 1.6.8p12 1.6.9 1.6.9p20 1.6.9p21 1.6.9p22 1.6.9p23
CVE-2012-0809 + https://www.sudo.ws/sudo/alerts/sudo_debug.html https://security.gentoo.org/glsa/glsa-201203-06.xml http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0591.html http://archives.neohapsis.com/archives/fulldisclosure/2012-01/att-0591/advisory_sudo.txt + 1.8.0 1.8.1 1.8.1p1 1.8.1p2 1.8.2 1.8.3 1.8.3p1
CVE-2011-0010 + https://exchange.xforce.ibmcloud.com/vulnerabilities/64636 http://www.vupen.com/english/advisories/2011/0362 http://www.vupen.com/english/advisories/2011/0212 http://www.vupen.com/english/advisories/2011/0199 http://www.vupen.com/english/advisories/2011/0195 http://www.vupen.com/english/advisories/2011/0182 https://www.ubuntu.com/usn/USN-1046-1 http://www.vupen.com/english/advisories/2011/0089 http://www.securityfocus.com/bid/45774 https://www.sudo.ws/repos/sudo/rev/07d1b0ce530e https://security.gentoo.org/glsa/glsa-201203-06.xml https://bugzilla.redhat.com/show_bug.cgi?id=668879 https://www.sudo.ws/sudo/alerts/runas_group_pw.html https://www.sudo.ws/repos/sudo/rev/fe8a94f96542 https://openwall.com/lists/oss-security/2011/01/12/1 https://openwall.com/lists/oss-security/2011/01/12/3 https://www.redhat.com/support/errata/RHSA-2011-0599.html http://www.mandriva.com/security/advisories?name=MDVSA-2011:018 http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593654 http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html https://openwall.com/lists/oss-security/2011/01/11/3 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609641 https://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html https://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html + 1.7.0 1.7.1 1.7.2p1 1.7.2p7 1.7.2p2 1.7.2p3 1.7.2p4 1.7.2p5 1.7.2 1.7.2p6 1.7.3b1 1.7.4p3 1.7.4p4 1.7.4 1.7.4p1 1.7.4p2
CVE-2011-0008 + http://www.mandriva.com/security/advisories?name=MDVSA-2011:018 https://exchange.xforce.ibmcloud.com/vulnerabilities/64965 https://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html https://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html http://www.vupen.com/english/advisories/2011/0195 https://bugzilla.redhat.com/show_bug.cgi?id=668843 http://www.vupen.com/english/advisories/2011/0199 + 1.3.1 1.5 1.5.2 1.5.3 1.5.6 1.5.7 1.5.8 1.5.9 1.6 1.6.1 1.6.2 1.6.2p3 1.6.2p2 1.6.2p1 1.6.3p1 1.6.3p6 1.6.3p4 1.6.3p2 1.6.3p3 1.6.3p5 1.6.3p3 1.6.3 1.6.3p5 1.6.3p6 1.6.3p2 1.6.3p7 1.6.3p7 1.6.3p4 1.6.3p1 1.6.4p1 1.6.4 1.6.4p2 1.6.4p1 1.6.4p2 1.6.5p2 1.6.5p1 1.6.5p1 1.6.5 1.6.5p2 1.6.6 1.6.7p1 1.6.7 1.6.7p4 1.6.7p5 1.6.7p3 1.6.7p5 1.6.7p2 1.6.8p9 1.6.8p1 1.6.8p1 1.6.8p7 1.6.8p6 1.6.8p12 1.6.8p12 1.6.8p7 1.6.8p8 1.6.8p3 1.6.8p4 1.6.8p8 1.6.8p9 1.6.8p2 1.6.8 1.6.8p2 1.6.8p10 1.6.8p5 1.6.8p5 1.6.8p11 1.6.9p16 1.6.9p18 1.6.9p15 1.6.9p10 1.6.9p22 1.6.9p7 1.6.9p19 1.6.9p18 1.6.9p9 1.6.9p20 1.6.9 1.6.9p17 1.6.9p22 1.6.9p12 1.6.9p11 1.6.9p1 1.6.9p21 1.6.9p4 1.6.9p19 1.6.9p17 1.6.9p14 1.6.9p21 1.6.9p2 1.6.9p23 1.6.9p20 1.6.9p5 1.6.9p13 1.6.9p8 1.6.9p3 1.6.9p6 1.7.0 1.7.1 1.7.2p5 1.7.2p7 1.7.2p4 1.7.2p2 1.7.2p3 1.7.2 1.7.2p6 1.7.2p1 1.7.3b1 1.7.4p4 1.7.4p5 1.7.4p2 1.7.4p3 1.7.4 1.7.4p1 1.7.4p5
CVE-2010-2956 + http://www.vupen.com/english/advisories/2010/2358 http://www.vupen.com/english/advisories/2011/0025 https://bugzilla.redhat.com/show_bug.cgi?id=628628 http://www.vupen.com/english/advisories/2010/2320 http://www.vupen.com/english/advisories/2010/2318 https://www.vmware.com/security/advisories/VMSA-2011-0001.html http://www.securityfocus.com/bid/43019 http://www.securitytracker.com/id?1024392 https://www.sudo.ws/sudo/alerts/runas_group.html http://www.vupen.com/english/advisories/2010/2312 https://www.ubuntu.com/usn/USN-983-1 http://www.securityfocus.com/archive/1/514489/100/0/threaded http://www.securityfocus.com/archive/1/515545/100/0/threaded https://www.redhat.com/support/errata/RHSA-2010-0675.html http://www.mandriva.com/security/advisories?name=MDVSA-2010:175 http://wiki.rpath.com/Advisories:rPSA-2010-0075 https://security.gentoo.org/glsa/glsa-201009-03.xml http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html https://lists.fedoraproject.org/pipermail/package-announce/2010-September/047516.html + 1.7.0 1.7.1 1.7.2 1.7.2p6 1.7.2p1 1.7.2p7 1.7.2p2 1.7.2p3 1.7.2p4 1.7.2p5 1.7.3b1 1.7.4p2 1.7.4p3 1.7.4 1.7.4p1
CVE-2010-1646 + https://bugzilla.redhat.com/show_bug.cgi?id=598154 http://www.vupen.com/english/advisories/2010/1478 http://www.vupen.com/english/advisories/2010/1518 http://www.vupen.com/english/advisories/2011/0212 http://www.vupen.com/english/advisories/2010/1519 https://www.sudo.ws/sudo/alerts/secure_path.html http://www.vupen.com/english/advisories/2010/1452 https://www.sudo.ws/repos/sudo/rev/a09c6812eaec https://www.sudo.ws/repos/sudo/rev/3057fde43cf0 http://www.securityfocus.com/bid/40538 http://www.securitytracker.com/id?1024101 http://www.securityfocus.com/archive/1/514489/100/0/threaded https://www.redhat.com/support/errata/RHSA-2010-0475.html http://www.mandriva.com/security/advisories?name=MDVSA-2010:118 https://www.debian.org/security/2010/dsa-2062 http://wiki.rpath.com/Advisories:rPSA-2010-0075 http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html https://security.gentoo.org/glsa/glsa-201009-03.xml https://lists.fedoraproject.org/pipermail/package-announce/2010-June/043026.html https://lists.fedoraproject.org/pipermail/package-announce/2010-June/042838.html https://lists.fedoraproject.org/pipermail/package-announce/2010-June/043012.html + 1.3.1 1.6 1.6.1 1.6.2p2 1.6.2p3 1.6.2 1.6.2p1 1.6.3p4 1.6.3p5 1.6.3 1.6.3p6 1.6.3p1 1.6.3p7 1.6.3p2 1.6.3p3 1.6.4p1 1.6.4p2 1.6.4 1.6.5 1.6.5p1 1.6.5p2 1.6.6 1.6.7p4 1.6.7p5 1.6.7 1.6.7p1 1.6.7p2 1.6.7p3 1.6.8p9 1.6.8p4 1.6.8p10 1.6.8p5 1.6.8 1.6.8p11 1.6.8p6 1.6.8p1 1.6.8p12 1.6.8p7 1.6.8p2 1.6.8p8 1.6.8p3 1.6.9p1 1.6.9p12 1.6.9p7 1.6.9p18 1.6.9p13 1.6.9p2 1.6.9p8 1.6.9p19 1.6.9p14 1.6.9p3 1.6.9p9 1.6.9p20 1.6.9p15 1.6.9p4 1.6.9p10 1.6.9p21 1.6.9p5 1.6.9p16 1.6.9 1.6.9p11 1.6.9p22 1.6.9p6 1.6.9p17 1.7.0 1.7.1 1.7.2p3 1.7.2p4 1.7.2p5 1.7.2 1.7.2p6 1.7.2p1 1.7.2p7 1.7.2p2
CVE-2010-1163 + http://www.vupen.com/english/advisories/2010/1019 https://exchange.xforce.ibmcloud.com/vulnerabilities/57836 http://www.vupen.com/english/advisories/2011/0212 http://www.vupen.com/english/advisories/2010/0956 http://www.vupen.com/english/advisories/2010/0895 http://www.vupen.com/english/advisories/2010/0904 http://www.vupen.com/english/advisories/2010/0949 http://www.vupen.com/english/advisories/2010/0881 http://www.securityfocus.com/bid/39468 https://www.sudo.ws/sudo/alerts/sudoedit_escalate2.html https://www.ubuntu.com/usn/USN-928-1 http://www.securityfocus.com/archive/1/510880/100/0/threaded http://www.securityfocus.com/archive/1/510827/100/0/threaded http://www.securityfocus.com/archive/1/510846/100/0/threaded http://www.securityfocus.com/archive/1/514489/100/0/threaded http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.577019 http://wiki.rpath.com/Advisories:rPSA-2010-0075 http://www.mandriva.com/security/advisories?name=MDVSA-2010:078 https://www.redhat.com/support/errata/RHSA-2010-0361.html https://lists.fedoraproject.org/pipermail/package-announce/2010-April/039986.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html + 1.6.8p1 1.6.8p12 1.6.8p2 1.6.8p7 1.6.8p5 1.6.8p7 1.6.8p8 1.6.8 1.6.8p9 1.6.9p20 1.6.9p21 1.6.9p22 1.6.9p17 1.6.9p18 1.6.9p19 1.7.0 1.7.1 1.7.2p1 1.7.2p2 1.7.2p3 1.7.2p4
CVE-2010-0427 + https://bugzilla.redhat.com/show_bug.cgi?id=567622 http://www.securityfocus.com/archive/1/514489/100/0/threaded https://www.ubuntu.com/usn/USN-905-1 https://www.sudo.ws/cgi-bin/cvsweb/sudo/set_perms.c.diff?r1=1.30.2.7&r2=1.30.2.8 https://www.gratisoft.us/bugzilla/attachment.cgi?id=255 https://www.gratisoft.us/bugzilla/show_bug.cgi?id=349 https://www.openwall.com/lists/oss-security/2010/02/23/4 https://www.openwall.com/lists/oss-security/2010/02/24/5 https://www.debian.org/security/2010/dsa-2006 https://www.gentoo.org/security/en/glsa/glsa-201003-01.xml http://wiki.rpath.com/Advisories:rPSA-2010-0075 https://sudo.ws/repos/sudo/rev/aa0b6c01c462 ftp://ftp.sudo.ws/pub/sudo/sudo-1.6.9p21.patch.gz http://securitytracker.com/id?1023658 http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html + 1.6 1.6.1 1.6.2 1.6.3p5 1.6.3 1.6.3p6 1.6.3p1 1.6.3p7 1.6.3p2 1.6.3p3 1.6.3p4 1.6.4p1 1.6.4p2 1.6.5p1 1.6.5p2 1.6.5 1.6.6 1.6.7 1.6.7p5 1.6.8p12 1.6.8 1.6.8p1 1.6.8p5 1.6.8p8 1.6.8p9 1.6.9p17 1.6.9p18 1.6.9p19
CVE-2010-0426 + ftp://ftp.sudo.ws/pub/sudo/sudo-1.6.9p21.patch.gz http://www.vupen.com/english/advisories/2010/0949 http://www.vupen.com/english/advisories/2010/0450 https://www.ubuntu.com/usn/USN-905-1 https://www.sudo.ws/sudo/stable.html http://www.securityfocus.com/bid/38362 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=570737 https://lists.fedoraproject.org/pipermail/package-announce/2010-May/040578.html https://lists.fedoraproject.org/pipermail/package-announce/2010-May/040588.html http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html http://securitytracker.com/id?1023658 http://www.securityfocus.com/archive/1/514489/100/0/threaded http://wiki.rpath.com/Advisories:rPSA-2010-0075 https://www.debian.org/security/2010/dsa-2006 https://www.gentoo.org/security/en/glsa/glsa-201003-01.xml https://www.linuxquestions.org/questions/linux-security-4/the-use-of-sudoedit-command-question-785442/ http://www.mandriva.com/security/advisories?name=MDVSA-2010:049 https://sudo.ws/repos/sudo/rev/f86e1b56d074 https://sudo.ws/repos/sudo/rev/88f3181692fe https://sudo.ws/bugs/show_bug.cgi?id=389 http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.577019 + 1.6 1.6.1 1.6.2 1.6.3p3 1.6.3p4 1.6.3p5 1.6.3p6 1.6.3p1 1.6.3p7 1.6.3 1.6.3p2 1.6.4p1 1.6.4p2 1.6.5p1 1.6.5p2 1.6.7p5 1.6.8p12 1.6.8p2 1.6.8p5 1.6.8p7 1.6.8p8 1.6.8p9 1.6.8p1 1.6.9p17 1.6.9p18 1.6.9p19 1.7.0 1.7.1 1.7.2 1.7.2p1 1.7.2p2 1.7.2p3
CVE-2009-0034 + https://www.vmware.com/security/advisories/VMSA-2009-0009.html https://issues.rpath.com/browse/RPL-2954 https://bugzilla.novell.com/show_bug.cgi?id=468923 http://www.vupen.com/english/advisories/2009/1865 https://www.sudo.ws/cgi-bin/cvsweb/sudo/parse.c.diff?r1=1.160.2.21&r2=1.160.2.22&f=h http://www.securitytracker.com/id?1021688 http://www.securityfocus.com/archive/1/500546/100/0/threaded http://www.securityfocus.com/archive/1/504849/100/0/threaded http://www.securityfocus.com/bid/33517 https://www.redhat.com/support/errata/RHSA-2009-0267.html http://wiki.rpath.com/Advisories:rPSA-2009-0021 http://www.mandriva.com/security/advisories?name=MDVSA-2009:033 https://www.gratisoft.us/bugzilla/show_bug.cgi?id=327 https://lists.vmware.com/pipermail/security-announce/2009/000060.html + 1.6.9p17 1.6.9p18 1.6.9p19
CVE-2007-4305 + http://www.securityfocus.com/bid/25258 https://secunia.com/advisories/26479 http://www.watson.org/~robert/2007woot/ + 1.5.6 1.5.7 1.5.8 1.5.9 1.6 1.6.1 1.6.2 1.6.3p6 1.6.3p3 1.6.3 1.6.3p5 1.6.3p2 1.6.3p7 1.6.3p4 1.6.3p1 1.6.3p6 1.6.3p3 1.6.3p5 1.6.3p2 1.6.3p7 1.6.3p4 1.6.3p1 1.6.4 1.6.4p2 1.6.4p1 1.6.4p2 1.6.4p1 1.6.5p2 1.6.5p1 1.6.5 1.6.5p2 1.6.5p1 1.6.6 1.6.7p5 1.6.7 1.6.8 1.6.8p12 1.6.8p1 1.6.8p9 1.6.8p5 1.6.8p7 1.6.8p8 1.6.8p2 1.6
CVE-2007-3149 + http://www.securityfocus.com/bid/24368 https://www.sudo.ws/cgi-bin/cvsweb/sudo/auth/kerb5.c http://www.securityfocus.com/archive/1/470774/100/0/threaded http://www.securityfocus.com/archive/1/470752/100/0/threaded http://www.securityfocus.com/archive/1/470739/100/0/threaded + 1.6.8p12
CVE-2006-0151 + https://usn.ubuntu.com/235-2/ http://www.trustix.org/errata/2006/0010 http://www.securityfocus.com/bid/16184 http://www.novell.com/linux/security/advisories/2006_02_sr.html http://www.mandriva.com/security/advisories?name=MDKSA-2006:159 https://www.debian.org/security/2006/dsa-946 http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822 + 1.5.6 1.5.7 1.5.8 1.5.9 1.6 1.6.1 1.6.2 1.6.3p3 1.6.3p4 1.6.3p5 1.6.3 1.6.3p6 1.6.3p1 1.6.3p7 1.6.3p2 1.6.4 1.6.4p1 1.6.4p2 1.6.5p2 1.6.5 1.6.5p1 1.6.6 1.6.7 1.6.7p5 1.6.8p12 1.6.8p2 1.6.8p5 1.6.8p7 1.6.8p8 1.6.8 1.6.8p9 1.6.8p1
CVE-2005-4158 + https://exchange.xforce.ibmcloud.com/vulnerabilities/23102 https://www.ubuntu.com/usn/usn-235-1/ http://www.vupen.com/english/advisories/2005/2386 http://www.trustix.org/errata/2006/0002/ https://www.sudo.ws/sudo/alerts/perl_env.html http://www.novell.com/linux/security/advisories/2006_02_sr.html http://securitytracker.com/alerts/2005/Nov/1015192.html https://www.debian.org/security/2006/dsa-946 http://www.mandriva.com/security/advisories?name=MDKSA-2005:234 http://www.securityfocus.com/bid/15394 http://www.mandriva.com/security/advisories?name=MDKSA-2006:159 + 1.5.6 1.5.7 1.5.8 1.5.9 1.6 1.6.1 1.6.2 1.6.3p3 1.6.3p4 1.6.3p5 1.6.3 1.6.3p6 1.6.3p1 1.6.3p7 1.6.3p2 1.6.4p1 1.6.4p2 1.6.4 1.6.5 1.6.5p1 1.6.5p2 1.6.6 1.6.7 1.6.7p5 1.6.8p5 1.6.8p7 1.6.8p8 1.6.8p9 1.6.8 1.6.8p1
CVE-2005-2959 + https://usn.ubuntu.com/213-1/ http://www.vupen.com/english/advisories/2007/0930 http://www.us-cert.gov/cas/techalerts/TA07-072A.html http://www.securityfocus.com/bid/15191 https://www.sudo.ws/bugs/show_bug.cgi?id=182 http://www.novell.com/linux/security/advisories/2006_02_sr.html http://www.openpkg.org/security/OpenPKG-SA-2006.002-sudo.html http://www.securityfocus.com/advisories/9643 http://www.mandriva.com/security/advisories?name=MDKSA-2005:201 https://www.debian.org/security/2005/dsa-870 https://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://docs.info.apple.com/article.html?artnum=305214 + 1.6 1.6.1 1.6.2 1.6.3p2 1.6.3p4 1.6.3p3 1.6.3 1.6.3p5 1.6.3p4 1.6.3p6 1.6.3p1 1.6.3p5 1.6.3p7 1.6.3p2 1.6.3p6 1.6.3p1 1.6.3p3 1.6.3p7 1.6.4 1.6.4p1 1.6.4p2 1.6.4p1 1.6.4p2 1.6.5 1.6.5p1 1.6.5p2 1.6.5p1 1.6.5p2 1.6.6 1.6.7 1.6.7p5 1.6.8
CVE-2005-1993 + http://www.securityfocus.com/archive/1/402741 https://www.debian.org/security/2005/dsa-735 https://exchange.xforce.ibmcloud.com/vulnerabilities/21080 http://www.securityfocus.com/archive/1/425974/100/0/threaded https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161116 http://www.vupen.com/english/advisories/2005/2659 http://www.vupen.com/english/advisories/2005/0821 https://www.sudo.ws/sudo/alerts/path_race.html http://www.securityfocus.com/bid/15647 http://www.securityfocus.com/bid/13993 http://www.novell.com/linux/security/advisories/2005_36_sudo.html https://www.redhat.com/support/errata/RHSA-2005-535.html http://docs.info.apple.com/article.html?artnum=302847 + 1.3.1 1.5.6 1.5.7 1.5.8 1.5.9 1.6 1.6.1 1.6.2 1.6.3p1 1.6.3p7 1.6.3p2 1.6.3p3 1.6.3p4 1.6.3p5 1.6.3 1.6.3p6 1.6.4 1.6.4p1 1.6.4p2 1.6.5p1 1.6.5p2 1.6.5 1.6.6 1.6.7 1.6.7p5 1.6.8 1.6.8p1 1.6.8p7 1.6.8p8
CVE-2005-1831 + https://marc.info/?l=bugtraq&m=111755694008928&w=2 http://archives.neohapsis.com/archives/bugtraq/2005-05/0359.html http://archives.neohapsis.com/archives/bugtraq/2005-05/0349.html + 1.6.8p7
CVE-2005-1119 + http://www.securityfocus.com/bid/13171 + 1.5.6 1.5.7 1.5.8 1.5.9 1.6 1.6.1 1.6.2 1.6.3 1.6.3p5 1.6.3p4 1.6.3p3 1.6.3p2 1.6.3p7 1.6.3p1 1.6.3p6 1.6.4p2 1.6.4p1 1.6.4 1.6.5 1.6.5p2 1.6.5p1 1.6.6 1.6.7 1.6.7p5 1.6.8p1 1.6.8p8 1.6.8
CVE-2004-1689 + https://www.kb.cert.org/vuls/id/424358 https://marc.info/?l=bugtraq&m=109537972929201&w=2 https://www.sudo.ws/sudo/alerts/sudoedit.html http://www.ciac.org/ciac/bulletins/o-219.shtml http://packetstormsecurity.nl/0409-exploits/sudoedit.txt http://www.securityfocus.com/bid/11204 https://exchange.xforce.ibmcloud.com/vulnerabilities/17424 + 1.6.8
CVE-2004-1051 + https://lists.apple.com/archives/security-announce/2005/May/msg00001.html https://www.debian.org/security/2004/dsa-596 http://www.mandriva.com/security/advisories?name=MDKSA-2004:133 http://www.securityfocus.com/bid/11668 https://exchange.xforce.ibmcloud.com/vulnerabilities/18055 http://www.trustix.org/errata/2004/0061/ https://www.sudo.ws/sudo/alerts/bash_functions.html https://www.ubuntu.com/usn/usn-28-1/ https://marc.info/?l=bugtraq&m=110598298225675&w=2 https://marc.info/?l=bugtraq&m=110028877431192&w=2 + 1.5.6 1.5.7 1.5.8 1.5.9 1.6 1.6.1 1.6.2 1.6.3p2 1.6.3p3 1.6.3p4 1.6.3p5 1.6.3 1.6.3p6 1.6.3p1 1.6.3p7 1.6.4 1.6.4p1 1.6.4p2 1.6.5p2 1.6.5 1.6.5p1 1.6.6 1.6.7 1.6.8 1.6.8p1
CVE-2002-0184 + https://www.redhat.com/support/errata/RHSA-2002-071.html http://www.securityfocus.com/bid/4593 http://www.novell.com/linux/security/advisories/2002_014_sudo_txt.html https://www.debian.org/security/2002/dsa-128 http://www.iss.net/security_center/static/8936.php https://www.kb.cert.org/vuls/id/820083 http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-028.php3 http://www.linuxsecurity.com/advisories/other_advisory-2040.html https://marc.info/?l=bugtraq&m=101979472822196&w=2 https://marc.info/?l=bugtraq&m=102010164413135&w=2 https://www.redhat.com/support/errata/RHSA-2002-072.html https://marc.info/?l=bugtraq&m=101975443619600&w=2 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000475 https://marc.info/?l=bugtraq&m=101974610509912&w=2 + 1.5.9 1.6 1.6.1 1.6.2 1.6.3p5 1.6.3 1.6.3p6 1.6.3p1 1.6.3p7 1.6.3p2 1.6.3p3 1.6.3p4 1.6.4p2 1.6.4 1.6.4p1 1.6.5 1.6.5p1 1.6.5p2
CVE-2002-0043 + ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A06.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000451 http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:003 https://marc.info/?l=bugtraq&m=101120193627756&w=2 https://www.debian.org/security/2002/dsa-101 http://www.novell.com/linux/security/advisories/2002_002_sudo_txt.html https://www.redhat.com/support/errata/RHSA-2002-011.html https://www.redhat.com/support/errata/RHSA-2002-013.html http://www.securityfocus.com/advisories/3800 https://exchange.xforce.ibmcloud.com/vulnerabilities/7891 http://www.securityfocus.com/bid/3871 https://www.sudo.ws/sudo/alerts/postfix.html http://www.securityfocus.com/archive/1/250168 + 1.6 1.6.1 1.6.2 1.6.3p4 1.6.3p5 1.6.3 1.6.3p6 1.6.3p1 1.6.3p7 1.6.3p2 1.6.3p3
CVE-1999-1496 + https://exchange.xforce.ibmcloud.com/vulnerabilities/2277 http://www.securityfocus.com/bid/321 http://www.securityfocus.com/archive/1/14665 + 1.5
CVE-1999-0958 + https://marc.info/?l=bugtraq&m=88465708614896&w=2 + 1.5 1.5.2 1.5.3
CVE-2015-5602 + https://www.exploit-db.com/exploits/37710/ | https://github.com/t0kx/privesc-CVE-2015-5602 + 1.6 1.6.1 1.6.2 1.6.3 1.6.3p1 1.6.3p2 1.6.3p3 1.6.3p4 1.6.3p5 1.6.3p6 1.6.3p7 1.6.4p1 1.6.4p2 1.6.5p1 1.6.5p2 1.6.7p5 1.6.8p1 1.6.8p2 1.6.8p5 1.6.8p7 1.6.8p8 1.6.8p9 1.6.8p12 1.6.9p17 1.6.9p18 1.6.9p19 1.6.9p20 1.6.9p21 1.6.9p22 1.7.0 1.7.1 1.7.2 1.7.2p1 1.7.2p2 1.7.2p3 1.7.2p4 1.7.3 1.7.4 1.7.5 1.7.6 1.7.7 1.7.8 1.7.9 1.7.10 1.8.0 1.8.1 1.8.2 1.8.3 1.8.4 1.8.5 1.8.6 1.8.7 1.8.8 1.8.9 1.8.10 1.8.11 1.8.12 1.8.13 1.8.14 <=1.8.14
CVE-2019-14287 + https://www.sudo.ws/alerts/minus_1_uid.html + 1.8.0 1.8.1 1.8.1p1 1.8.1p2 1.8.2 1.8.3 1.8.3p1 1.8.3p2 1.8.4 1.8.4p1 1.8.4p2 1.8.4p3 1.8.4p4 1.8.4p5 1.8.5 1.8.5p1 1.8.5p2 1.8.5p3 1.8.6 1.8.6p1 1.8.6p2 1.8.6p3 1.8.6p4 1.8.6p5 1.8.6p6 1.8.6p7 1.8.6p8 1.8.7 1.8.8 1.8.9 1.8.9p1 1.8.9p2 1.8.9p3 1.8.9p4 1.8.9p5 1.8.10 1.8.10p1 1.8.10p2 1.8.10p3 1.8.11 1.8.11p1 1.8.11p2 1.8.12 1.8.13 1.8.14 1.8.14p1 1.8.14p2 1.8.14p3 1.8.15 1.8.16 1.8.17 1.8.17p1 1.8.18 1.8.18p1 1.8.19 1.8.19p1 1.8.19p2 1.8.20 1.8.20p1 1.8.20p2 1.8.21 1.8.21p1 1.8.21p2 1.8.22 1.8.23 1.8.24 1.8.25 1.8.25p1 1.8.26 1.8.27 <=1.8.27
CVE-2019-18634 + https://www.sudo.ws/alerts/pwfeedback.html + 1.8.0 1.8.1 1.8.1p1 1.8.1p2 1.8.2 1.8.3 1.8.3p1 1.8.3p2 1.8.4 1.8.4p1 1.8.4p2 1.8.4p3 1.8.4p4 1.8.4p5 1.8.5 1.8.5p1 1.8.5p2 1.8.5p3 1.8.6 1.8.6p1 1.8.6p2 1.8.6p3 1.8.6p4 1.8.6p5 1.8.6p6 1.8.6p7 1.8.6p8 1.8.7 1.8.8 1.8.9 1.8.9p1 1.8.9p2 1.8.9p3 1.8.9p4 1.8.9p5 1.8.10 1.8.10p1 1.8.10p2 1.8.10p3 1.8.11 1.8.11p1 1.8.11p2 1.8.12 1.8.13 1.8.14 1.8.14p1 1.8.14p2 1.8.14p3 1.8.15 1.8.16 1.8.17 1.8.17p1 1.8.18 1.8.18p1 1.8.19 1.8.19p1 1.8.19p2 1.8.20 1.8.20p1 1.8.20p2 1.8.21 1.8.21p1 1.8.21p2 1.8.22 1.8.23 1.8.24 1.8.25 1.8.25p1 1.8.26 1.8.27 1.8.28 1.8.28p1 1.8.29 1.8.30 <=1.8.30
CVE-2021-3156 + https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit https://www.sudo.ws/alerts/unescape_overflow.html + 1.7.0 1.7.1 1.7.2 1.7.2p1 1.7.2p2 1.7.2p3 1.7.2p4 1.7.3 1.7.4 1.7.5 1.7.6 1.7.7 1.7.8 1.7.9 1.7.10 1.7.10p1 1.7.10p2 1.7.10p3 1.7.10p4 1.7.10p5 1.7.10p6 1.7.10p7 1.7.10p8 1.7.10p9 1.8.2 1.8.3 1.8.3p1 1.8.3p2 1.8.4 1.8.4p1 1.8.4p2 1.8.4p3 1.8.4p4 1.8.4p5 1.8.5 1.8.5p1 1.8.5p2 1.8.5p3 1.8.6 1.8.6p1 1.8.6p2 1.8.6p3 1.8.6p4 1.8.6p5 1.8.6p6 1.8.6p7 1.8.6p8 1.8.7 1.8.8 1.8.9 1.8.9p1 1.8.9p2 1.8.9p3 1.8.9p4 1.8.9p5 1.8.10 1.8.10p1 1.8.10p2 1.8.10p3 1.8.11 1.8.11p1 1.8.11p2 1.8.12 1.8.13 1.8.14 1.8.14p1 1.8.14p2 1.8.14p3 1.8.15 1.8.16 1.8.17 1.8.17p1 1.8.18 1.8.18p1 1.8.19 1.8.19p1 1.8.19p2 1.8.20 1.8.20p1 1.8.20p2 1.8.21 1.8.21p1 1.8.21p2 1.8.22 1.8.23 1.8.24 1.8.25 1.8.25p1 1.8.26 1.8.27 1.8.28 1.8.28p1 1.8.29 1.8.30 1.8.31 1.8.31p1 1.8.31p2 1.9.0 1.9.2 1.9.3 1.9.3p1 1.9.4 1.9.4p1 1.9.4p2 1.9.5 1.9.5p1 <= 1.7.7-1.7.10p9, 1.8.2-1.8.31p2, and 1.9.0-1.9.5p1
CVE-2021-23240 + https://blog.mirch.io/2021/01/25/sudoedit-lpe/ https://www.tenable.com/cve/CVE-2021-23240 https://www.sudo.ws/alerts/sudoedit_selinux.html https://blog.mirch.io/2021/01/25/sudoedit-lpe/ + 1.8.11 1.8.11p1 1.8.11p2 1.8.12 1.8.13 1.8.14 1.8.14p1 1.8.14p2 1.8.14p3 1.8.15 1.8.16 1.8.17 1.8.17p1 1.8.18 1.8.18p1 1.8.19 1.8.19p1 1.8.19p2 1.8.20 1.8.20p1 1.8.20p2 1.8.21 1.8.21p1 1.8.21p2 1.8.22 1.8.23 1.8.24 1.8.25 1.8.25p1 1.8.26 1.8.27 1.8.28 1.8.28p1 1.8.29 1.8.30 1.8.31 1.8.31p1 1.8.31p2 1.9.0 1.9.2 1.9.3 1.9.3p1 1.9.4 1.9.4p1 1.9.4p2 <=1.9.4p2
CVE-2023-22809 + https://www.sudo.ws/security/advisories/sudoedit_any/ https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf + 1.8.0 1.8.1 1.8.1p1 1.8.1p2 1.8.2 1.8.3 1.8.3p1 1.8.3p2 1.8.4 1.8.4p1 1.8.4p2 1.8.4p3 1.8.4p4 1.8.4p5 1.8.5 1.8.5p1 1.8.5p2 1.8.5p3 1.8.6 1.8.6p1 1.8.6p2 1.8.6p3 1.8.6p4 1.8.6p5 1.8.6p6 1.8.6p7 1.8.6p8 1.8.7 1.8.8 1.8.9 1.8.9p1 1.8.9p2 1.8.9p3 1.8.9p4 1.8.9p5 1.8.10 1.8.10p1 1.8.10p2 1.8.10p3 1.8.11 1.8.11p1 1.8.11p2 1.8.12 1.8.13 1.8.14 1.8.14p1 1.8.14p2 1.8.14p3 1.8.15 1.8.16 1.8.17 1.8.17p1 1.8.18 1.8.18p1 1.8.19 1.8.19p1 1.8.19p2 1.8.20 1.8.20p1 1.8.20p2 1.8.21 1.8.21p1 1.8.21p2 1.8.22 1.8.23 1.8.24 1.8.25 1.8.25p1 1.8.26 1.8.27 1.8.28 1.8.28p1 1.8.29 1.8.30 1.8.31 1.8.31p1 1.8.31p2 1.9.0 1.9.2 1.9.3 1.9.3p1 1.9.4 1.9.4p1 1.9.4p2 1.9.5 1.9.5p1 1.9.5p2 1.9.6 1.9.6p1 1.9.7 1.9.7p1 1.9.7p2 1.9.8 1.9.8p1 1.9.8p2 1.9.9 1.9.10 1.9.11 1.9.11p1 1.9.11p2 1.9.11p3 1.9.12 1.9.12p1 <=1.9.12p1