{"id":"CVE-2018-1071","details":"zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.","modified":"2026-04-10T04:04:02.024533Z","published":"2018-03-09T15:29:00.267Z","related":["MGASA-2018-0206","SUSE-SU-2018:1072-1","SUSE-SU-2018:1874-1","SUSE-SU-2022:14910-1","openSUSE-SU-2024:11543-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3073"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00038.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201805-10"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3608-1/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103359"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1553531"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/zsh-users/zsh","events":[{"introduced":"0"},{"last_affected":"6ff4787e830f8edb3a7e32490a88a131e4b62f7f"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.4.2"}]}}],"versions":["5.1.1-test-2","5.3.1-test-2","5.4","5.4.1","post-opt-arg","pre-func-move","pre-opt-arg","zsg-4.1.1-test-2","zsh-3.1.6-dev-21","zsh-3.1.6-dev-22","zsh-3.1.7","zsh-3.1.7-pre-2","zsh-3.1.7-pre-3","zsh-3.1.7-pre-4","zsh-3.1.7-prep-1","zsh-3.1.8","zsh-3.1.9","zsh-3.1.9-dev-1","zsh-3.1.9-dev-2","zsh-3.1.9-dev-3","zsh-3.1.9-dev-4","zsh-3.1.9-dev-5","zsh-3.1.9-dev-6","zsh-3.1.9-dev-7","zsh-3.1.9-dev-8","zsh-4.0.1","zsh-4.0.1-pre-1","zsh-4.0.1-pre-3","zsh-4.0.1-pre-4","zsh-4.0.1-pre-5","zsh-4.0.2-pre-2","zsh-4.1.0-dev-1","zsh-4.1.0-dev-2","zsh-4.1.0-dev-3","zsh-4.1.0-dev-4","zsh-4.1.0-dev-5","zsh-4.1.0-dev-7","zsh-4.1.1","zsh-4.1.1-test-1","zsh-4.1.1-test-3","zsh-4.2.0","zsh-4.2.0-pre-1","zsh-4.2.0-pre-2","zsh-4.2.0-pre-3","zsh-4.2.0-pre-4","zsh-4.2.1","zsh-4.2.1-test-A","zsh-4.2.2","zsh-4.2.3","zsh-4.3.0-dev-3","zsh-4.3.0-dev-4","zsh-4.3.0-dev-5","zsh-4.3.1","zsh-4.3.10","zsh-4.3.10-dev-2","zsh-4.3.10-test-3","zsh-4.3.11","zsh-4.3.11-dev-4","zsh-4.3.12","zsh-4.3.12-test-3","zsh-4.3.13","zsh-4.3.14","zsh-4.3.15","zsh-4.3.16","zsh-4.3.17","zsh-4.3.17-test-2","zsh-4.3.2","zsh-4.3.3","zsh-4.3.4","zsh-4.3.4-dev-2","zsh-4.3.4-dev-4","zsh-4.3.4-dev-5","zsh-4.3.4-dev-6","zsh-4.3.4-dev-7","zsh-4.3.4-dev-8","zsh-4.3.5","zsh-4.3.5-dev-1","zsh-4.3.5-dev-2","zsh-4.3.5-dev-3","zsh-4.3.5-dev-4","zsh-4.3.6","zsh-4.3.6-dev-1","zsh-4.3.6-dev-2","zsh-4.3.7","zsh-4.3.8","zsh-4.3.9","zsh-4.3.9-dev-3","zsh-4.3.9-dev-5","zsh-5.0.0","zsh-5.0.0-test-1","zsh-5.0.1","zsh-5.0.2","zsh-5.0.2-test-1","zsh-5.0.2-test-2","zsh-5.0.2-test-3","zsh-5.0.3","zsh-5.0.4","zsh-5.0.5","zsh-5.0.5-dev-1","zsh-5.0.5-dev-2","zsh-5.0.5-dev-3","zsh-5.0.6","zsh-5.0.6-dev-1","zsh-5.0.7","zsh-5.0.7-dev-2","zsh-5.0.7-dev-4","zsh-5.0.8","zsh-5.0.8-test-3","zsh-5.1","zsh-5.1-test-1","zsh-5.1.1","zsh-5.1.1-test-1","zsh-5.1.1-test-2","zsh-5.1.1-test-3","zsh-5.2","zsh-5.2-test-1","zsh-5.2-test-2","zsh-5.2-test-3","zsh-5.3","zsh-5.3.1","zsh-5.4","zsh-5.4.1","zsh-5.4.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1071.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}