openSUSE 16 Security Update : php8 (openSUSE-SU-2026:20113-1)

high Nessus Plugin ID 296993

Language:

Synopsis

The remote openSUSE host is missing one or more security updates.

Description

The remote openSUSE 16 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2026:20113-1 advisory.

Version update to 8.4.16:

Security fixes:

- CVE-2025-14177: getimagesize() function may leak uninitialized heap memory into the APPn segments when reading images in multi-chunk mode (bsc#1255710).
- CVE-2025-14178: heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE (bsc#1255711).
- CVE-2025-14180: null pointer dereference in pdo_parse_params() function when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled (bsc#1255712).

Other fixes:

- php8 contains Directories owned by wwwrun but does not require User. (bsc#1255043)

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1255043

https://bugzilla.suse.com/1255710

https://bugzilla.suse.com/1255711

https://bugzilla.suse.com/1255712

https://www.suse.com/security/cve/CVE-2025-14177

https://www.suse.com/security/cve/CVE-2025-14178

https://www.suse.com/security/cve/CVE-2025-14180

Plugin Details

Severity: High

ID: 296993

File Name: openSUSE-2026-20113-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 1/28/2026

Updated: 1/28/2026

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.0

CVSS v2

Risk Factor: High

Base Score: 8.5

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:C

CVSS Score Source: CVE-2025-14178

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

Risk Factor: High

Base Score: 8.2

Threat Score: 6.9

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2025-14180

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:php8-ldap, p-cpe:/a:novell:opensuse:php8-tokenizer, p-cpe:/a:novell:opensuse:php8-gettext, p-cpe:/a:novell:opensuse:php8-openssl, p-cpe:/a:novell:opensuse:php8-mysql, p-cpe:/a:novell:opensuse:php8-sodium, p-cpe:/a:novell:opensuse:php8-tidy, p-cpe:/a:novell:opensuse:php8-sysvsem, p-cpe:/a:novell:opensuse:php8-calendar, p-cpe:/a:novell:opensuse:php8-xmlreader, p-cpe:/a:novell:opensuse:php8-xmlwriter, p-cpe:/a:novell:opensuse:php8-fpm, p-cpe:/a:novell:opensuse:php8-odbc, p-cpe:/a:novell:opensuse:php8-sysvmsg, p-cpe:/a:novell:opensuse:php8-soap, p-cpe:/a:novell:opensuse:php8-phar, p-cpe:/a:novell:opensuse:apache2-mod_php8, p-cpe:/a:novell:opensuse:php8-dom, p-cpe:/a:novell:opensuse:php8-posix, p-cpe:/a:novell:opensuse:php8-readline, p-cpe:/a:novell:opensuse:php8-fpm-apache, p-cpe:/a:novell:opensuse:php8-mbstring, p-cpe:/a:novell:opensuse:php8-exif, p-cpe:/a:novell:opensuse:php8-enchant, p-cpe:/a:novell:opensuse:php8-dba, p-cpe:/a:novell:opensuse:php8-pdo, p-cpe:/a:novell:opensuse:php8-fileinfo, p-cpe:/a:novell:opensuse:php8-ctype, p-cpe:/a:novell:opensuse:php8-ffi, p-cpe:/a:novell:opensuse:php8-devel, p-cpe:/a:novell:opensuse:php8-ftp, p-cpe:/a:novell:opensuse:php8-intl, p-cpe:/a:novell:opensuse:php8-shmop, p-cpe:/a:novell:opensuse:php8-test, cpe:/o:novell:opensuse:16.0, p-cpe:/a:novell:opensuse:php8-bcmath, p-cpe:/a:novell:opensuse:php8-opcache, p-cpe:/a:novell:opensuse:php8, p-cpe:/a:novell:opensuse:php8-embed, p-cpe:/a:novell:opensuse:php8-sysvshm, p-cpe:/a:novell:opensuse:php8-gmp, p-cpe:/a:novell:opensuse:php8-zip, p-cpe:/a:novell:opensuse:php8-sockets, p-cpe:/a:novell:opensuse:php8-iconv, p-cpe:/a:novell:opensuse:php8-gd, p-cpe:/a:novell:opensuse:php8-sqlite, p-cpe:/a:novell:opensuse:php8-cli, p-cpe:/a:novell:opensuse:php8-snmp, p-cpe:/a:novell:opensuse:php8-pcntl, p-cpe:/a:novell:opensuse:php8-bz2, p-cpe:/a:novell:opensuse:php8-curl, p-cpe:/a:novell:opensuse:php8-xsl, p-cpe:/a:novell:opensuse:php8-zlib, p-cpe:/a:novell:opensuse:php8-fastcgi, p-cpe:/a:novell:opensuse:php8-pgsql

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/26/2026

Vulnerability Publication Date: 12/17/2025

Reference Information

CVE: CVE-2025-14177, CVE-2025-14178, CVE-2025-14180

IAVA: 2026-A-0020