<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for zsh</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:1893-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-07-05T18:18:30Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-07-05T18:18:30Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-07-05T18:18:30Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for zsh</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for zsh to version 5.5 fixes the following issues:

Security issues fixed:

- CVE-2018-1100: Fixes a buffer overflow in utils.c:checkmailpath() that can lead to
  local arbitrary code execution (bsc#1089030)
- CVE-2018-1071: Fixed a stack-based buffer overflow
  in exec.c:hashcmd() (bsc#1084656)
- CVE-2018-1083: Fixed a stack-based buffer overflow
  in gen_matches_files() at compctl.c (bsc#1087026)

Non-security issues fixed:

- The effect of the NO_INTERACTIVE_COMMENTS option extends into $(...)
  and `...` command substitutions when used on the command line.
- The 'exec' and 'command' precommand modifiers, and options to
  them, are now parsed after parameter expansion.
- Functions executed by ZLE widgets no longer have their standard
  input closed, but redirected from /dev/null instead.
- There is an option WARN_NESTED_VAR, a companion to the existing
  WARN_CREATE_GLOBAL that causes a warning if a function updates a
  variable from an enclosing scope without using typeset -g.
- zmodload now has an option -s to be silent on a failure to find
  a module but still print other errors.

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-07/msg00000.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:1893-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="zsh-5.5-lp150.2.3.1">
      <FullProductName ProductID="zsh-5.5-lp150.2.3.1">zsh-5.5-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zsh-htmldoc-5.5-lp150.2.3.1">
      <FullProductName ProductID="zsh-htmldoc-5.5-lp150.2.3.1">zsh-htmldoc-5.5-lp150.2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="zsh-5.5-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:zsh-5.5-lp150.2.3.1">zsh-5.5-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="zsh-htmldoc-5.5-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:zsh-htmldoc-5.5-lp150.2.3.1">zsh-htmldoc-5.5-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2018-1071</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:zsh-5.5-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:zsh-htmldoc-5.5-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-07/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1071.html</URL>
        <Description>CVE-2018-1071</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1084656</URL>
        <Description>SUSE Bug 1084656</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.</Note>
    </Notes>
    <CVE>CVE-2018-1083</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:zsh-5.5-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:zsh-htmldoc-5.5-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-07/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1083.html</URL>
        <Description>CVE-2018-1083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087026</URL>
        <Description>SUSE Bug 1087026</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.</Note>
    </Notes>
    <CVE>CVE-2018-1100</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:zsh-5.5-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:zsh-htmldoc-5.5-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-07/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1100.html</URL>
        <Description>CVE-2018-1100</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089030</URL>
        <Description>SUSE Bug 1089030</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
