Permalink
CVE-2026-2641
3.3 LOW
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
universal-ctags V Language v.c parseExprList recursion
A weakness has been identified in universal-ctags ctags up to 6.2.1. The affected element is the function parseExpression/parseExprList of the file parsers/v.c of the component V Language Parser. Executing a manipulation can lead to uncontrolled recursion. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
References
- VDB-346397 | universal-ctags V Language v.c parseExprList recursion vdb-entry technical-description
- VDB-346397 | CTI Indicators (IOB, IOC, IOA) signature permissions-required
- Submit #752768 | universal-ctags ctags master-branch Uncontrolled Recursion third-party-advisory
- https://github.com/universal-ctags/ctags/issues/4369 issue-tracking
- https://github.com/oneafter/0116/blob/main/poc.v exploit
- https://github.com/universal-ctags/ctags/ product
Affected products
ctags
- ==6.2.1
- ==6.2.0
Matching in nixpkgs
Package maintainers
-
@voronind-com Dmitry Voronin <hi@voronind.com>
-
@pacien euxane <r9uhdi.nixpkgs@euxane.eu>