{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "Security fixes\n- CVE-2025-1736: verify CR during header check to prevent some misbehavior",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://errata.tuxcare.com/els/csaf/v2/advisories/els_lang_php/el7.php/csaf/v2/advisories/2025/clsa-2025_1746984618.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1746984618",
        "url": "https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1746984618"
      }
    ],
    "tracking": {
      "current_release_date": "2025-05-11T17:31:25Z",
      "generator": {
        "date": "2025-05-11T17:31:25Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1746984618",
      "initial_release_date": "2025-05-11T17:31:25Z",
      "revision_history": [
        {
          "date": "2025-05-11T17:31:25Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "alt-php74: Fix of CVE-2025-1736"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 7",
                "product": {
                  "name": "Community Enterprise Operating System 7",
                  "product_id": "CentOS-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Cloud Linux Software, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alt-php74-0:7.4.33-35.el7.x86_64",
                "product": {
                  "name": "alt-php74-0:7.4.33-35.el7.x86_64",
                  "product_id": "alt-php74-0:7.4.33-35.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/alt-php74@7.4.33-35.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-php74-fpm-0:7.4.33-35.el7.x86_64",
                "product": {
                  "name": "alt-php74-fpm-0:7.4.33-35.el7.x86_64",
                  "product_id": "alt-php74-fpm-0:7.4.33-35.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/alt-php74-fpm@7.4.33-35.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-php74-gd-0:7.4.33-35.el7.x86_64",
                "product": {
                  "name": "alt-php74-gd-0:7.4.33-35.el7.x86_64",
                  "product_id": "alt-php74-gd-0:7.4.33-35.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/alt-php74-gd@7.4.33-35.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-php74-pspell-0:7.4.33-35.el7.x86_64",
                "product": {
                  "name": "alt-php74-pspell-0:7.4.33-35.el7.x86_64",
                  "product_id": "alt-php74-pspell-0:7.4.33-35.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/alt-php74-pspell@7.4.33-35.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-php74-pdo-0:7.4.33-35.el7.x86_64",
                "product": {
                  "name": "alt-php74-pdo-0:7.4.33-35.el7.x86_64",
                  "product_id": "alt-php74-pdo-0:7.4.33-35.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/alt-php74-pdo@7.4.33-35.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-php74-odbc-0:7.4.33-35.el7.x86_64",
                "product": {
                  "name": "alt-php74-odbc-0:7.4.33-35.el7.x86_64",
                  "product_id": "alt-php74-odbc-0:7.4.33-35.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/alt-php74-odbc@7.4.33-35.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-php74-xml-0:7.4.33-35.el7.x86_64",
                "product": {
                  "name": "alt-php74-xml-0:7.4.33-35.el7.x86_64",
                  "product_id": "alt-php74-xml-0:7.4.33-35.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/alt-php74-xml@7.4.33-35.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-php74-imap-0:7.4.33-35.el7.x86_64",
                "product": {
                  "name": "alt-php74-imap-0:7.4.33-35.el7.x86_64",
                  "product_id": "alt-php74-imap-0:7.4.33-35.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/alt-php74-imap@7.4.33-35.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-php74-process-0:7.4.33-35.el7.x86_64",
                "product": {
                  "name": "alt-php74-process-0:7.4.33-35.el7.x86_64",
                  "product_id": "alt-php74-process-0:7.4.33-35.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/alt-php74-process@7.4.33-35.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-php74-firebird-0:7.4.33-35.el7.x86_64",
                "product": {
                  "name": "alt-php74-firebird-0:7.4.33-35.el7.x86_64",
                  "product_id": "alt-php74-firebird-0:7.4.33-35.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/alt-php74-firebird@7.4.33-35.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-php74-0:7.4.33-35.el7.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:alt-php74-0:7.4.33-35.el7.x86_64"
        },
        "product_reference": "alt-php74-0:7.4.33-35.el7.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-php74-fpm-0:7.4.33-35.el7.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:alt-php74-fpm-0:7.4.33-35.el7.x86_64"
        },
        "product_reference": "alt-php74-fpm-0:7.4.33-35.el7.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-php74-gd-0:7.4.33-35.el7.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:alt-php74-gd-0:7.4.33-35.el7.x86_64"
        },
        "product_reference": "alt-php74-gd-0:7.4.33-35.el7.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-php74-pspell-0:7.4.33-35.el7.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:alt-php74-pspell-0:7.4.33-35.el7.x86_64"
        },
        "product_reference": "alt-php74-pspell-0:7.4.33-35.el7.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-php74-pdo-0:7.4.33-35.el7.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:alt-php74-pdo-0:7.4.33-35.el7.x86_64"
        },
        "product_reference": "alt-php74-pdo-0:7.4.33-35.el7.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-php74-odbc-0:7.4.33-35.el7.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:alt-php74-odbc-0:7.4.33-35.el7.x86_64"
        },
        "product_reference": "alt-php74-odbc-0:7.4.33-35.el7.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-php74-xml-0:7.4.33-35.el7.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:alt-php74-xml-0:7.4.33-35.el7.x86_64"
        },
        "product_reference": "alt-php74-xml-0:7.4.33-35.el7.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-php74-imap-0:7.4.33-35.el7.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:alt-php74-imap-0:7.4.33-35.el7.x86_64"
        },
        "product_reference": "alt-php74-imap-0:7.4.33-35.el7.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-php74-process-0:7.4.33-35.el7.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:alt-php74-process-0:7.4.33-35.el7.x86_64"
        },
        "product_reference": "alt-php74-process-0:7.4.33-35.el7.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-php74-firebird-0:7.4.33-35.el7.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:alt-php74-firebird-0:7.4.33-35.el7.x86_64"
        },
        "product_reference": "alt-php74-firebird-0:7.4.33-35.el7.x86_64",
        "relates_to_product_reference": "CentOS-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-1736",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "description",
          "text": "In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when user-supplied headers are sent, the insufficient validation of the end-of-line characters may prevent certain headers from being sent or lead to certain headers be misinterpreted.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:alt-php74-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-fpm-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-gd-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-pspell-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-pdo-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-odbc-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-xml-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-imap-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-process-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-firebird-0:7.4.33-35.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-lang/cve/CVE-2025-1736"
        }
      ],
      "release_date": "2025-03-30T05:49:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:alt-php74-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-fpm-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-gd-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-pspell-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-pdo-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-odbc-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-xml-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-imap-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-process-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-firebird-0:7.4.33-35.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2024-11235",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??=  operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:alt-php74-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-fpm-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-gd-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-pspell-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-pdo-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-odbc-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-xml-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-imap-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-process-0:7.4.33-35.el7.x86_64",
          "CentOS-7:alt-php74-firebird-0:7.4.33-35.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-lang/cve/CVE-2024-11235"
        },
        {
          "category": "external",
          "summary": "https://github.com/php/php-src/security/advisories/GHSA-rwp7-7vc6-8477",
          "url": "https://github.com/php/php-src/security/advisories/GHSA-rwp7-7vc6-8477"
        }
      ],
      "release_date": "2025-04-04T18:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:alt-php74-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-fpm-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-gd-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-pspell-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-pdo-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-odbc-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-xml-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-imap-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-process-0:7.4.33-35.el7.x86_64",
            "CentOS-7:alt-php74-firebird-0:7.4.33-35.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    }
  ]
}