The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:1025-1 advisory. – CVE-2024-11235: Fixed reference counting in php_request_shutdown causing Use-After-Free (bsc#1239666) – CVE-2025-1217: Fixed header parser of http stream wrapper not handling folded headers (bsc#1239664) – CVE-2025-1219: Fixed libxml streams using wrong content-type header when requesting a redirected resource (bsc#1239667) – CVE-2025-1734: Fixed streams HTTP wrapper not failing for headers with invalid name and no colon (bsc#1239668) – CVE-2025-1736: Fixed stream HTTP wrapper header check might omitting basic auth header (bsc#1239670) – CVE-2025-1861: Fixed stream HTTP wrapper truncate redirect location to 1024 bytes (bsc#1239669) Tenable has extracted the preceding description block directly from the SUSE security advisory. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. File data…Read More
References
Back to Main