<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for zsh</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:1093-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-04-26T17:48:59Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-04-26T17:48:59Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-04-26T17:48:59Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for zsh</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for zsh fixes the following issues:

- CVE-2014-10070: environment variable injection could lead to local privilege escalation (bnc#1082885)
- CVE-2014-10071: buffer overflow in exec.c could lead to denial of service. (bnc#1082977)
- CVE-2014-10072: buffer overflow In utils.c when scanning very long directory paths for symbolic links. (bnc#1082975)
- CVE-2016-10714: In zsh before 5.3, an off-by-one error resulted in 
  undersized buffers that were intended to support PATH_MAX characters. (bnc#1083250)
- CVE-2017-18205: In builtin.c when sh compatibility mode is used, a NULL pointer dereference 
  could lead to denial of service (bnc#1082998)
- CVE-2018-1071: exec.c:hashcmd() function vulnerability could lead to denial of service. (bnc#1084656)
- CVE-2018-1083: Autocomplete vulnerability could lead to privilege escalation. (bnc#1087026)
- CVE-2018-7549: In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, 
  as demonstrated by typeset -p. (bnc#1082991)
- CVE-2017-18206: buffer overrun in xsymlinks could lead to denial of service (bnc#1083002)
- Autocomplete and REPORTTIME broken (bsc#896914)

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:1093-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="zsh-5.0.5-9.3.1">
      <FullProductName ProductID="zsh-5.0.5-9.3.1">zsh-5.0.5-9.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zsh-htmldoc-5.0.5-9.3.1">
      <FullProductName ProductID="zsh-htmldoc-5.0.5-9.3.1">zsh-htmldoc-5.0.5-9.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="zsh-5.0.5-9.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:zsh-5.0.5-9.3.1">zsh-5.0.5-9.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="zsh-htmldoc-5.0.5-9.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:zsh-htmldoc-5.0.5-9.3.1">zsh-htmldoc-5.0.5-9.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). That could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where "env_reset" has been disabled.</Note>
    </Notes>
    <CVE>CVE-2014-10070</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:zsh-5.0.5-9.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:zsh-htmldoc-5.0.5-9.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-10070.html</URL>
        <Description>CVE-2014-10070</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082885</URL>
        <Description>SUSE Bug 1082885</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the "&gt;&amp; fd" syntax.</Note>
    </Notes>
    <CVE>CVE-2014-10071</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:zsh-5.0.5-9.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:zsh-htmldoc-5.0.5-9.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-10071.html</URL>
        <Description>CVE-2014-10071</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082977</URL>
        <Description>SUSE Bug 1082977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In utils.c in zsh before 5.0.6, there is a buffer overflow when scanning very long directory paths for symbolic links.</Note>
    </Notes>
    <CVE>CVE-2014-10072</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:zsh-5.0.5-9.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:zsh-htmldoc-5.0.5-9.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-10072.html</URL>
        <Description>CVE-2014-10072</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082975</URL>
        <Description>SUSE Bug 1082975</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In zsh before 5.3, an off-by-one error resulted in undersized buffers that were intended to support PATH_MAX characters.</Note>
    </Notes>
    <CVE>CVE-2016-10714</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:zsh-5.0.5-9.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:zsh-htmldoc-5.0.5-9.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10714.html</URL>
        <Description>CVE-2016-10714</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083250</URL>
        <Description>SUSE Bug 1083250</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is a NULL pointer dereference during processing of the cd command with no argument if HOME is not set.</Note>
    </Notes>
    <CVE>CVE-2017-18205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:zsh-5.0.5-9.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:zsh-htmldoc-5.0.5-9.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18205.html</URL>
        <Description>CVE-2017-18205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082998</URL>
        <Description>SUSE Bug 1082998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2017-18206</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:zsh-5.0.5-9.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:zsh-htmldoc-5.0.5-9.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18206.html</URL>
        <Description>CVE-2017-18206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083002</URL>
        <Description>SUSE Bug 1083002</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2018-1071</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:zsh-5.0.5-9.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:zsh-htmldoc-5.0.5-9.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1071.html</URL>
        <Description>CVE-2018-1071</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1084656</URL>
        <Description>SUSE Bug 1084656</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.</Note>
    </Notes>
    <CVE>CVE-2018-1083</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:zsh-5.0.5-9.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:zsh-htmldoc-5.0.5-9.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1083.html</URL>
        <Description>CVE-2018-1083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087026</URL>
        <Description>SUSE Bug 1087026</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p.</Note>
    </Notes>
    <CVE>CVE-2018-7549</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:zsh-5.0.5-9.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:zsh-htmldoc-5.0.5-9.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7549.html</URL>
        <Description>CVE-2018-7549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082991</URL>
        <Description>SUSE Bug 1082991</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
