Vulnerability Database
Blog
FAQ
Docs
SUSE-SU-2018:1037-1
See a problem?
Please try reporting it
to the source
first.
Source
https://www.suse.com/support/update/announcement/2018/suse-su-20181037-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:1037-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2018:1037-1
Related
CVE-2018-1100
Published
2018-04-20T13:22:10Z
Modified
2018-04-20T13:22:10Z
Summary
Security update for zsh
Details
This update for zsh fixes the following issues:
CVE-2018-1100: Fixed a buffer overflow in utils.c:checkmailpath() that could lead to local arbitrary code execution ( bsc#1089030)
References
https://www.suse.com/support/update/announcement/2018/suse-su-20181037-1/
https://bugzilla.suse.com/1089030
https://www.suse.com/security/cve/CVE-2018-1100
Affected packages
SUSE:Linux Enterprise Server 11 SP4
/
zsh
Package
Name
zsh
Purl
pkg:rpm/suse/zsh&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
4.3.6-67.9.3.1
Ecosystem specific
{ "binaries": [ { "zsh": "4.3.6-67.9.3.1" } ] }
SUSE:Linux Enterprise Server for SAP Applications 11 SP4
/
zsh
Package
Name
zsh
Purl
pkg:rpm/suse/zsh&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
4.3.6-67.9.3.1
Ecosystem specific
{ "binaries": [ { "zsh": "4.3.6-67.9.3.1" } ] }
SUSE-SU-2018:1037-1 - OSV