CVE-2015-8980

NameCVE-2015-8980
DescriptionThe plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs851770

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php-gettext (PTS)jessie1.0.11-1vulnerable
buster, stretch1.0.12-0.1fixed
bullseye1.0.12-4fixed
bookworm1.0.12-5fixed
sid, trixie1.0.12-6fixed
phpmyadmin (PTS)jessie, jessie (lts)4:4.2.12-2+deb8u12vulnerable
stretch (security)4:4.6.6-4+deb9u2fixed
stretch (lts), stretch4:4.6.6-4+deb9u3fixed
bullseye4:5.0.4+dfsg2-2+deb11u1fixed
bookworm4:5.2.1+dfsg-1fixed
sid, trixie4:5.2.1+dfsg-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php-gettextsource(unstable)1.0.12-0.1851770
phpmyadminsource(unstable)4:4.6.6-1unimportant

Notes

[jessie] - php-gettext <no-dsa> (Minor issue)
[wheezy] - php-gettext <no-dsa> (Minor issue)
For phpmyadmin, unimportant, since embeds lib but does not use in exploitable way
http://seclists.org/fulldisclosure/2016/Aug/76
Upstream patch: https://bazaar.launchpad.net/~danilo/php-gettext/trunk/revision/61

Search for package or bug name: Reporting problems