CVE-2015-8980

NameCVE-2015-8980
DescriptionThe plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs851770

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php-gettext (PTS)buster1.0.12-0.1fixed
bullseye1.0.12-4fixed
bookworm1.0.12-5fixed
sid, trixie1.0.12-6fixed
phpmyadmin (PTS)bullseye4:5.0.4+dfsg2-2+deb11u1fixed
bookworm4:5.2.1+dfsg-1fixed
trixie4:5.2.1+dfsg-2fixed
sid4:5.2.1+dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php-gettextsource(unstable)1.0.12-0.1851770
phpmyadminsource(unstable)4:4.6.6-1unimportant

Notes

[jessie] - php-gettext <no-dsa> (Minor issue)
[wheezy] - php-gettext <no-dsa> (Minor issue)
For phpmyadmin, unimportant, since embeds lib but does not use in exploitable way
http://seclists.org/fulldisclosure/2016/Aug/76
Upstream patch: https://bazaar.launchpad.net/~danilo/php-gettext/trunk/revision/61

Search for package or bug name: Reporting problems