zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
Acknowledgments: Name: Richard Maciel Costa (Red Hat)
Created zsh tracking bugs for this issue: Affects: fedora-all [bug 1553533]
Do we have a reproducer and/or fix for this bug? "a stack-based buffer overflow in the exec.c:hashcmd() function" is too vague and I was not able to find any publicly available information about CVE-2018-1071).
(In reply to Kamil Dudka from comment #3) > Do we have a reproducer and/or fix for this bug? > > "a stack-based buffer overflow in the exec.c:hashcmd() function" is too > vague and I was not able to find any publicly available information about > CVE-2018-1071). Setting needinfo for the original reporter, Richard Costa.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:3073 https://access.redhat.com/errata/RHSA-2018:3073