Bugzilla – Bug 1089030
VUL-0: CVE-2018-1100: zsh: buffer overflow in utils.c:checkmailpath() can lead to local arbitrary code execution
Last modified: 2024-05-23 19:37:48 UTC
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user. References: https://bugzilla.redhat.com/show_bug.cgi?id=1563395 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1100
Upstream fix: https://sourceforge.net/p/zsh/code/ci/31f72205630687c1cef89347863aab355296a27f/
All codestreams are affected: SUSE:SLE-10-SP3:Update SUSE:SLE-11:Update SUSE:SLE-12:Update
SUSE-SU-2018:1037-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1089030 CVE References: CVE-2018-1100 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): zsh-4.3.6-67.9.3.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): zsh-4.3.6-67.9.3.1
An update workflow for this issue was started. This issue was rated as important. Please submit fixed packages until 2018-05-09. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/64024
openSUSE-SU-2018:1893-1: An update that fixes three vulnerabilities is now available. Category: security (moderate) Bug References: 1084656,1087026,1089030 CVE References: CVE-2018-1071,CVE-2018-1083,CVE-2018-1100 Sources used: openSUSE Leap 15.0 (src): zsh-5.5-lp150.2.3.1
This is an autogenerated message for OBS integration: This bug (1089030) was mentioned in https://build.opensuse.org/request/show/637015 42.3 / zsh
openSUSE-SU-2018:2966-1: An update that solves 5 vulnerabilities and has four fixes is now available. Category: security (important) Bug References: 1019130,1084656,1087026,1089030,1107294,1107296,900424,934175,998858 CVE References: CVE-2018-0502,CVE-2018-1071,CVE-2018-1083,CVE-2018-1100,CVE-2018-13259 Sources used: openSUSE Leap 42.3 (src): zsh-5.6.2-9.6.1
Hi Support, I have a customer who are focus on this CVE. I don't see any information of SLES12SP5 about this CVE on https://www.suse.com/security/cve/. Is SLES12 SP5 affected by this CVE? Is it a plan to merge it into SLES12sp5? Thanks.
Is there any progress? Customer ping me again.
https://ptf.suse.com/b27a428a0750dc195e58933ba4411674/sles12-sp2/22609/x86_64/20210716
(In reply to junwei chen from comment #23) > https://ptf.suse.com/b27a428a0750dc195e58933ba4411674/sles12-sp2/22609/ > x86_64/20210716 This ptf fixed several CVEs include CVE-2018-1100.
SUSE-SU-2022:0733-1: An update that fixes three vulnerabilities is now available. Category: security (important) Bug References: 1089030,1163882,1196435 CVE References: CVE-2018-1100,CVE-2019-20044,CVE-2021-45444 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): zsh-5.0.5-6.19.1 SUSE OpenStack Cloud Crowbar 8 (src): zsh-5.0.5-6.19.1 SUSE OpenStack Cloud 9 (src): zsh-5.0.5-6.19.1 SUSE OpenStack Cloud 8 (src): zsh-5.0.5-6.19.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): zsh-5.0.5-6.19.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): zsh-5.0.5-6.19.1 SUSE Linux Enterprise Server 12-SP5 (src): zsh-5.0.5-6.19.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): zsh-5.0.5-6.19.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): zsh-5.0.5-6.19.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): zsh-5.0.5-6.19.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): zsh-5.0.5-6.19.1 HPE Helion Openstack 8 (src): zsh-5.0.5-6.19.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.