<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">zsh-5.8-7.7 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11543-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">zsh-5.8-7.7 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the zsh-5.8-7.7 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11543</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-0502/</URL>
      <Description>SUSE CVE CVE-2018-0502 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1071/</URL>
      <Description>SUSE CVE CVE-2018-1071 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1083/</URL>
      <Description>SUSE CVE CVE-2018-1083 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1100/</URL>
      <Description>SUSE CVE CVE-2018-1100 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-13259/</URL>
      <Description>SUSE CVE CVE-2018-13259 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20044/</URL>
      <Description>SUSE CVE CVE-2019-20044 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="zsh-5.8-7.7">
      <FullProductName ProductID="zsh-5.8-7.7">zsh-5.8-7.7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zsh-htmldoc-5.8-7.7">
      <FullProductName ProductID="zsh-htmldoc-5.8-7.7">zsh-htmldoc-5.8-7.7</FullProductName>
    </Branch>
    <Relationship ProductReference="zsh-5.8-7.7" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:zsh-5.8-7.7">zsh-5.8-7.7 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="zsh-htmldoc-5.8-7.7" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:zsh-htmldoc-5.8-7.7">zsh-htmldoc-5.8-7.7 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line.</Note>
    </Notes>
    <CVE>CVE-2018-0502</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:zsh-5.8-7.7</ProductID>
        <ProductID>openSUSE Tumbleweed:zsh-htmldoc-5.8-7.7</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-0502.html</URL>
        <Description>CVE-2018-0502</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107296</URL>
        <Description>SUSE Bug 1107296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194009</URL>
        <Description>SUSE Bug 1194009</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194012</URL>
        <Description>SUSE Bug 1194012</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200039</URL>
        <Description>SUSE Bug 1200039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200209</URL>
        <Description>SUSE Bug 1200209</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2018-1071</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:zsh-5.8-7.7</ProductID>
        <ProductID>openSUSE Tumbleweed:zsh-htmldoc-5.8-7.7</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1071.html</URL>
        <Description>CVE-2018-1071</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1084656</URL>
        <Description>SUSE Bug 1084656</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200039</URL>
        <Description>SUSE Bug 1200039</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.</Note>
    </Notes>
    <CVE>CVE-2018-1083</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:zsh-5.8-7.7</ProductID>
        <ProductID>openSUSE Tumbleweed:zsh-htmldoc-5.8-7.7</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1083.html</URL>
        <Description>CVE-2018-1083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087026</URL>
        <Description>SUSE Bug 1087026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189668</URL>
        <Description>SUSE Bug 1189668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200209</URL>
        <Description>SUSE Bug 1200209</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.</Note>
    </Notes>
    <CVE>CVE-2018-1100</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:zsh-5.8-7.7</ProductID>
        <ProductID>openSUSE Tumbleweed:zsh-htmldoc-5.8-7.7</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1100.html</URL>
        <Description>CVE-2018-1100</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089030</URL>
        <Description>SUSE Bug 1089030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189668</URL>
        <Description>SUSE Bug 1189668</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one.</Note>
    </Notes>
    <CVE>CVE-2018-13259</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:zsh-5.8-7.7</ProductID>
        <ProductID>openSUSE Tumbleweed:zsh-htmldoc-5.8-7.7</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-13259.html</URL>
        <Description>CVE-2018-13259</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107294</URL>
        <Description>SUSE Bug 1107294</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194009</URL>
        <Description>SUSE Bug 1194009</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194012</URL>
        <Description>SUSE Bug 1194012</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200039</URL>
        <Description>SUSE Bug 1200039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200209</URL>
        <Description>SUSE Bug 1200209</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().</Note>
    </Notes>
    <CVE>CVE-2019-20044</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:zsh-5.8-7.7</ProductID>
        <ProductID>openSUSE Tumbleweed:zsh-htmldoc-5.8-7.7</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20044.html</URL>
        <Description>CVE-2019-20044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163882</URL>
        <Description>SUSE Bug 1163882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200039</URL>
        <Description>SUSE Bug 1200039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200202</URL>
        <Description>SUSE Bug 1200202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200209</URL>
        <Description>SUSE Bug 1200209</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
