OESA-2023-1693

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1693
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1693.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2023-1693
Upstream
Published
2023-09-28T11:06:02Z
Modified
2025-08-12T05:15:56.506374Z
Summary
ctags security update
Details

Ctags generates an index (or tag) file of language objects found in source files that allows these items to be quickly and easily located by a text editor or other utility. A tag signifies a language object for which an index entry is available (or, alternatively, the index entry created for that object).

Security Fix(es):

A flaw was found in Exuberant Ctags in the way it handles the "-o" option. This option specifies the tag filename. A crafted tag filename specified in the command line or in the configuration file results in arbitrary command execution because the externalSortTags() in sort.c calls the system(3) function in an unsafe way.(CVE-2022-4515)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP3 / ctags

Package

Name
ctags
Purl
pkg:rpm/openEuler/ctags&distro=openEuler-20.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.8-28.oe1

Ecosystem specific

{
    "x86_64": [
        "ctags-5.8-28.oe1.x86_64.rpm",
        "ctags-debugsource-5.8-28.oe1.x86_64.rpm",
        "ctags-debuginfo-5.8-28.oe1.x86_64.rpm"
    ],
    "src": [
        "ctags-5.8-28.oe1.src.rpm"
    ],
    "aarch64": [
        "ctags-debugsource-5.8-28.oe1.aarch64.rpm",
        "ctags-5.8-28.oe1.aarch64.rpm",
        "ctags-debuginfo-5.8-28.oe1.aarch64.rpm"
    ],
    "noarch": [
        "ctags-help-5.8-28.oe1.noarch.rpm"
    ]
}