<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for zsh</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:1072-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-04-25T12:15:43Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-04-25T12:15:43Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-04-25T12:15:43Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for zsh</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for zsh fixes the following issues:

  - CVE-2014-10070: environment variable injection could lead to local privilege escalation (bnc#1082885)

  - CVE-2014-10071: buffer overflow in exec.c could lead to denial of service. (bnc#1082977)

  - CVE-2014-10072: buffer overflow In utils.c when scanning 
very long directory paths for symbolic links. (bnc#1082975)

  - CVE-2016-10714: In zsh before 5.3, an off-by-one error resulted in 
undersized buffers that were intended to support PATH_MAX characters. (bnc#1083250)

  - CVE-2017-18205: In builtin.c when sh compatibility mode is used, a NULL pointer dereference 
could lead to denial of service (bnc#1082998)

  - CVE-2018-1071: exec.c:hashcmd() function vulnerability could lead to denial of service. (bnc#1084656)
 
  - CVE-2018-1083: Autocomplete vulnerability could lead to privilege escalation. (bnc#1087026)

  - CVE-2018-7549: In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, 
as demonstrated by typeset -p. (bnc#1082991)
  
  - CVE-2017-18206: buffer overrun in xsymlinks could lead to denial of service (bnc#1083002)
    
  - Autocomplete and REPORTTIME broken (bsc#896914)

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-DESKTOP-12-SP3-2018-733,SUSE-SLE-SERVER-12-SP3-2018-733</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181072-1/</URL>
      <Description>Link for SUSE-SU-2018:1072-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:1072-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082885</URL>
      <Description>SUSE Bug 1082885</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082975</URL>
      <Description>SUSE Bug 1082975</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082977</URL>
      <Description>SUSE Bug 1082977</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082991</URL>
      <Description>SUSE Bug 1082991</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082998</URL>
      <Description>SUSE Bug 1082998</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1083002</URL>
      <Description>SUSE Bug 1083002</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1083250</URL>
      <Description>SUSE Bug 1083250</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1084656</URL>
      <Description>SUSE Bug 1084656</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1087026</URL>
      <Description>SUSE Bug 1087026</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/896914</URL>
      <Description>SUSE Bug 896914</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-10070/</URL>
      <Description>SUSE CVE CVE-2014-10070 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-10071/</URL>
      <Description>SUSE CVE CVE-2014-10071 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-10072/</URL>
      <Description>SUSE CVE CVE-2014-10072 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10714/</URL>
      <Description>SUSE CVE CVE-2016-10714 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-18205/</URL>
      <Description>SUSE CVE CVE-2017-18205 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-18206/</URL>
      <Description>SUSE CVE CVE-2017-18206 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1071/</URL>
      <Description>SUSE CVE CVE-2018-1071 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1083/</URL>
      <Description>SUSE CVE CVE-2018-1083 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7549/</URL>
      <Description>SUSE CVE CVE-2018-7549 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP3" CPE="cpe:/o:suse:sled:12:sp3">SUSE Linux Enterprise Desktop 12 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3" CPE="cpe:/o:suse:sles:12:sp3">SUSE Linux Enterprise Server 12 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3" CPE="cpe:/o:suse:sles_sap:12:sp3">SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="zsh-5.0.5-6.7.2">
      <FullProductName ProductID="zsh-5.0.5-6.7.2">zsh-5.0.5-6.7.2</FullProductName>
    </Branch>
    <Relationship ProductReference="zsh-5.0.5-6.7.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP3:zsh-5.0.5-6.7.2">zsh-5.0.5-6.7.2 as a component of SUSE Linux Enterprise Desktop 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="zsh-5.0.5-6.7.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3:zsh-5.0.5-6.7.2">zsh-5.0.5-6.7.2 as a component of SUSE Linux Enterprise Server 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="zsh-5.0.5-6.7.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3:zsh-5.0.5-6.7.2">zsh-5.0.5-6.7.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). That could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where "env_reset" has been disabled.</Note>
    </Notes>
    <CVE>CVE-2014-10070</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:zsh-5.0.5-6.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181072-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-10070.html</URL>
        <Description>CVE-2014-10070</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082885</URL>
        <Description>SUSE Bug 1082885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200039</URL>
        <Description>SUSE Bug 1200039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200209</URL>
        <Description>SUSE Bug 1200209</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the "&gt;&amp; fd" syntax.</Note>
    </Notes>
    <CVE>CVE-2014-10071</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:zsh-5.0.5-6.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181072-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-10071.html</URL>
        <Description>CVE-2014-10071</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082977</URL>
        <Description>SUSE Bug 1082977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200039</URL>
        <Description>SUSE Bug 1200039</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In utils.c in zsh before 5.0.6, there is a buffer overflow when scanning very long directory paths for symbolic links.</Note>
    </Notes>
    <CVE>CVE-2014-10072</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:zsh-5.0.5-6.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181072-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-10072.html</URL>
        <Description>CVE-2014-10072</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082975</URL>
        <Description>SUSE Bug 1082975</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200039</URL>
        <Description>SUSE Bug 1200039</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In zsh before 5.3, an off-by-one error resulted in undersized buffers that were intended to support PATH_MAX characters.</Note>
    </Notes>
    <CVE>CVE-2016-10714</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:zsh-5.0.5-6.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181072-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10714.html</URL>
        <Description>CVE-2016-10714</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083250</URL>
        <Description>SUSE Bug 1083250</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200039</URL>
        <Description>SUSE Bug 1200039</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is a NULL pointer dereference during processing of the cd command with no argument if HOME is not set.</Note>
    </Notes>
    <CVE>CVE-2017-18205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:zsh-5.0.5-6.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181072-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18205.html</URL>
        <Description>CVE-2017-18205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082998</URL>
        <Description>SUSE Bug 1082998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200039</URL>
        <Description>SUSE Bug 1200039</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2017-18206</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:zsh-5.0.5-6.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181072-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18206.html</URL>
        <Description>CVE-2017-18206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083002</URL>
        <Description>SUSE Bug 1083002</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215218</URL>
        <Description>SUSE Bug 1215218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2018-1071</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:zsh-5.0.5-6.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181072-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1071.html</URL>
        <Description>CVE-2018-1071</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1084656</URL>
        <Description>SUSE Bug 1084656</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200039</URL>
        <Description>SUSE Bug 1200039</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.</Note>
    </Notes>
    <CVE>CVE-2018-1083</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:zsh-5.0.5-6.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181072-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1083.html</URL>
        <Description>CVE-2018-1083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087026</URL>
        <Description>SUSE Bug 1087026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189668</URL>
        <Description>SUSE Bug 1189668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200209</URL>
        <Description>SUSE Bug 1200209</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p.</Note>
    </Notes>
    <CVE>CVE-2018-7549</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3:zsh-5.0.5-6.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:zsh-5.0.5-6.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181072-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7549.html</URL>
        <Description>CVE-2018-7549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082991</URL>
        <Description>SUSE Bug 1082991</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200039</URL>
        <Description>SUSE Bug 1200039</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
