First published: Fri Mar 09 2018(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zsh Zsh | <=5.4.2 | |
Debian Debian Linux | =7.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
debian/zsh | 5.8-6+deb11u1 5.9-4 5.9-8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1071 is a vulnerability in zsh through version 5.4.2 that allows for a stack-based buffer overflow.
CVE-2018-1071 has a severity rating of 5.5 (medium).
CVE-2018-1071 affects zsh through version 5.4.2.
A local attacker can exploit CVE-2018-1071 to cause a denial of service.
You can find more information about CVE-2018-1071 at the following references: [MITRE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1071), [Ubuntu Security Notices](https://ubuntu.com/security/notices/USN-3608-1), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2018-1071).