{"id":"MGASA-2014-0415","summary":"Updated ctags package fixes security vulnerability","details":"A denial of service issue was discovered in ctags 5.8. A remote attacker could\ncause excessive CPU usage and disk space consumption via a crafted JavaScript\nfile by triggering an infinite loop (CVE-2014-7204).\n","modified":"2026-01-31T05:33:16.001777Z","published":"2014-10-23T13:27:57Z","related":["CVE-2014-7204"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0415.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=14277"},{"type":"REPORT","url":"https://lists.fedoraproject.org/pipermail/package-announce/2014-October/140349.html"}],"affected":[{"package":{"name":"ctags","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/ctags?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.8-6.1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0415.json"}},{"package":{"name":"ctags","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/ctags?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.8-7.1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0415.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}