First published: Tue Apr 03 2018(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zsh Zsh | <=5.4.2 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
debian/zsh | 5.8-6+deb11u1 5.9-4 5.9-8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1100 is a vulnerability in zsh through version 5.4.2 that allows a local attacker to execute arbitrary code in the context of another user.
CVE-2018-1100 has a severity rating of 7.8 (high).
CVE-2018-1100 affects zsh versions up to and including 5.4.2.
Yes, updating zsh to version 5.7.1-1+deb10u1 or later, or 5.8-6+deb11u1 or later can remedy CVE-2018-1100.
More information about CVE-2018-1100 can be found in the following references: [link1](https://access.redhat.com/errata/RHSA-2018:1932), [link2](https://access.redhat.com/errata/RHSA-2018:3073), [link3](https://bugzilla.redhat.com/show_bug.cgi?id=1563395).