CVE-2024-43370

NameCVE-2024-43370
Descriptiongettext.js is a GNU gettext port for node and the browser. There is a cross-site scripting (XSS) injection if `.po` dictionary definition files are corrupted. This vulnerability has been patched in version 2.0.3. As a workaround, control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1078880

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gettext.js (PTS)bullseye0.7.0-2+deb11u1fixed
bookworm0.7.0-3+deb12u1fixed
sid, trixie0.7.0-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gettext.jssourcebullseye0.7.0-2+deb11u1
gettext.jssourcebookworm0.7.0-2+deb11u1
gettext.jssource(unstable)0.7.0-41078880

Notes

https://github.com/guillaumepotier/gettext.js/security/advisories/GHSA-vwhg-jwr4-vxgg
Fixed by: https://github.com/guillaumepotier/gettext.js/commit/6e52e0f8fa7d7c8b358e78b613d47ea332b8a56c (2.0.3)

Search for package or bug name: Reporting problems