vulnerability
SUSE: CVE-2024-11236: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | 2024-11-24 | 2025-01-03 | 2025-01-28 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
2024-11-24
Added
2025-01-03
Modified
2025-01-28
Description
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write.
Solution(s)
suse-upgrade-apache2-mod_php8suse-upgrade-php8suse-upgrade-php8-bcmathsuse-upgrade-php8-bz2suse-upgrade-php8-calendarsuse-upgrade-php8-clisuse-upgrade-php8-ctypesuse-upgrade-php8-curlsuse-upgrade-php8-dbasuse-upgrade-php8-develsuse-upgrade-php8-domsuse-upgrade-php8-embedsuse-upgrade-php8-enchantsuse-upgrade-php8-exifsuse-upgrade-php8-fastcgisuse-upgrade-php8-ffisuse-upgrade-php8-fileinfosuse-upgrade-php8-fpmsuse-upgrade-php8-fpm-apachesuse-upgrade-php8-ftpsuse-upgrade-php8-gdsuse-upgrade-php8-gettextsuse-upgrade-php8-gmpsuse-upgrade-php8-iconvsuse-upgrade-php8-intlsuse-upgrade-php8-ldapsuse-upgrade-php8-mbstringsuse-upgrade-php8-mysqlsuse-upgrade-php8-odbcsuse-upgrade-php8-opcachesuse-upgrade-php8-opensslsuse-upgrade-php8-pcntlsuse-upgrade-php8-pdosuse-upgrade-php8-pgsqlsuse-upgrade-php8-pharsuse-upgrade-php8-posixsuse-upgrade-php8-readlinesuse-upgrade-php8-shmopsuse-upgrade-php8-snmpsuse-upgrade-php8-soapsuse-upgrade-php8-socketssuse-upgrade-php8-sodiumsuse-upgrade-php8-sqlitesuse-upgrade-php8-sysvmsgsuse-upgrade-php8-sysvsemsuse-upgrade-php8-sysvshmsuse-upgrade-php8-testsuse-upgrade-php8-tidysuse-upgrade-php8-tokenizersuse-upgrade-php8-xmlreadersuse-upgrade-php8-xmlwritersuse-upgrade-php8-xslsuse-upgrade-php8-zipsuse-upgrade-php8-zlib

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.