CVE-2018-1100 log

Source
Severity High
Remote No
Type Arbitrary code execution
Description
A stack-based buffer overflow has been found in zsh <= 5.4.2, in the checkmailpath() function, where unchecked strings from the MAILCHECK variable are copied to a buffer.  A local, unprivileged user can create a specially crafted message file, which, if used to set a custom "you have new mail" message, leads to code execution in the context of the user who receives the message. If the user affected is privileged, this leads to privilege escalation.
Group Package Affected Fixed Severity Status Ticket
AVG-669 zsh 5.4.2-2 5.5-1 High Fixed
Date Advisory Group Package Severity Type
11 Apr 2018 ASA-201804-5 AVG-669 zsh High arbitrary code execution
References
https://www.zsh.org/mla/workers/2018/msg00411.html
https://sourceforge.net/p/zsh/code/ci/31f72205630687c1cef89347863aab355296a27f/