Debian Security Advisory DSA 3042-1 (exuberant-ctags - security update)

Summary
Stefano Zacchiroli discovered a vulnerability in exuberant-ctags, a tool to build tag file indexes of source code definitions: Certain JavaScript files cause ctags to enter an infinite loop until it runs out of disk space, resulting in denial of service.
Solution
For the stable distribution (wheezy), this problem has been fixed in version 1:5.9~svn20110310-4+deb7u1. For the testing distribution (jessie), this problem has been fixed in version 1:5.9~svn20110310-8. For the unstable distribution (sid), this problem has been fixed in version 1:5.9~svn20110310-8. We recommend that you upgrade your exuberant-ctags packages.
Insight
ctags parses source code and produces a sort of index mapping the names of significant entities (e.g. functions, classes, variables) to the location where that entity is defined. This index is used by editors like vi and emacsen to allow moving to the definition of a user-specified entity.
Affected
exuberant-ctags on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References