Bugzilla – Bug 1107296
VUL-0: CVE-2018-0502: zsh: The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line
Last modified: 2022-03-14 20:20:30 UTC
CVE-2018-0502 An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0502 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908000 https://www.zsh.org/mla/zsh-announce/136 https://sourceforge.net/p/zsh/code/ci/1c4c7b6a4d17294df028322b70c53803a402233d
This is an autogenerated message for OBS integration: This bug (1107296) was mentioned in https://build.opensuse.org/request/show/633484 Factory / zsh
This is an autogenerated message for OBS integration: This bug (1107296) was mentioned in https://build.opensuse.org/request/show/633489 Factory / zsh
SUSE-SU-2018:2686-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1107294,1107296 CVE References: CVE-2018-0502,CVE-2018-13259 Sources used: SUSE Linux Enterprise Module for Basesystem 15 (src): zsh-5.6-3.6.1
openSUSE-SU-2018:2741-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1107294,1107296 CVE References: CVE-2018-0502,CVE-2018-13259 Sources used: openSUSE Leap 15.0 (src): zsh-5.6-lp150.2.6.1
This is an autogenerated message for OBS integration: This bug (1107296) was mentioned in https://build.opensuse.org/request/show/637015 42.3 / zsh
openSUSE-SU-2018:2966-1: An update that solves 5 vulnerabilities and has four fixes is now available. Category: security (important) Bug References: 1019130,1084656,1087026,1089030,1107294,1107296,900424,934175,998858 CVE References: CVE-2018-0502,CVE-2018-1071,CVE-2018-1083,CVE-2018-1100,CVE-2018-13259 Sources used: openSUSE Leap 42.3 (src): zsh-5.6.2-9.6.1
Hi Support, I have a customer who are focus on this CVE. I don't see any information of SLES12SP5 about this CVE on https://www.suse.com/security/cve/. Is SLES12 SP5 affected by this CVE? Is it a plan to merge it into SLES12sp5? Thanks.
SUSE-SU-2022:0161-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1107294,1107296 CVE References: CVE-2018-0502,CVE-2018-13259 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): zsh-5.0.5-6.12.2 SUSE OpenStack Cloud Crowbar 8 (src): zsh-5.0.5-6.12.2 SUSE OpenStack Cloud 9 (src): zsh-5.0.5-6.12.2 SUSE OpenStack Cloud 8 (src): zsh-5.0.5-6.12.2 SUSE Linux Enterprise Server for SAP 12-SP4 (src): zsh-5.0.5-6.12.2 SUSE Linux Enterprise Server for SAP 12-SP3 (src): zsh-5.0.5-6.12.2 SUSE Linux Enterprise Server 12-SP5 (src): zsh-5.0.5-6.12.2 SUSE Linux Enterprise Server 12-SP4-LTSS (src): zsh-5.0.5-6.12.2 SUSE Linux Enterprise Server 12-SP3-LTSS (src): zsh-5.0.5-6.12.2 SUSE Linux Enterprise Server 12-SP3-BCL (src): zsh-5.0.5-6.12.2 SUSE Linux Enterprise Server 12-SP2-BCL (src): zsh-5.0.5-6.12.2 HPE Helion Openstack 8 (src): zsh-5.0.5-6.12.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:14910-1: An update that fixes 12 vulnerabilities is now available. Category: security (important) Bug References: 1082885,1082975,1082977,1082991,1082998,1083002,1083250,1084656,1087026,1107294,1107296,1163882 CVE References: CVE-2014-10070,CVE-2014-10071,CVE-2014-10072,CVE-2016-10714,CVE-2017-18205,CVE-2017-18206,CVE-2018-0502,CVE-2018-1071,CVE-2018-1083,CVE-2018-13259,CVE-2018-7549,CVE-2019-20044 JIRA References: Sources used: SUSE Linux Enterprise Server 11-SP4-LTSS (src): zsh-4.3.6-67.9.8.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): zsh-4.3.6-67.9.8.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): zsh-4.3.6-67.9.8.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): zsh-4.3.6-67.9.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.