{
  "document": {
    "aggregate_severity": {
      "text": "Medium"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos8.4els/vex/2025/cve-2025-48367-els_os-centos8_4els.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-08T20:33:42Z",
      "generator": {
        "date": "2026-04-08T20:33:42Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CVE-2025-48367-ELS_OS-CENTOS8.4ELS",
      "initial_release_date": "2025-07-07T15:25:00Z",
      "revision_history": [
        {
          "date": "2025-07-07T15:25:00Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-04-08T20:33:42Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "Security update on CVE-2025-48367"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 8.4",
                "product": {
                  "name": "Community Enterprise Operating System 8.4",
                  "product_id": "CentOS-8.4",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:8.4:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tar-2:1.30-5.el8.x86_64",
                "product": {
                  "name": "tar-2:1.30-5.el8.x86_64",
                  "product_id": "tar-2:1.30-5.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/tar@1.30-5.el8?arch=x86_64&epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tar-2:1.30-5.el8.tuxcare.els2.x86_64",
                "product": {
                  "name": "tar-2:1.30-5.el8.tuxcare.els2.x86_64",
                  "product_id": "tar-2:1.30-5.el8.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/tar@1.30-5.el8.tuxcare.els2?arch=x86_64&epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tar-2:1.30-5.el8.tuxcare.els1.x86_64",
                "product": {
                  "name": "tar-2:1.30-5.el8.tuxcare.els1.x86_64",
                  "product_id": "tar-2:1.30-5.el8.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/tar@1.30-5.el8.tuxcare.els1?arch=x86_64&epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tar-2:1.30-5.el8.tuxcare.els2.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:tar-2:1.30-5.el8.tuxcare.els2.x86_64"
        },
        "product_reference": "tar-2:1.30-5.el8.tuxcare.els2.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tar-2:1.30-5.el8.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:tar-2:1.30-5.el8.x86_64"
        },
        "product_reference": "tar-2:1.30-5.el8.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tar-2:1.30-5.el8.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:tar-2:1.30-5.el8.tuxcare.els1.x86_64"
        },
        "product_reference": "tar-2:1.30-5.el8.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-48367",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "description",
          "text": "Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "known_affected": [
          "CentOS-8.4:tar-2:1.30-5.el8.tuxcare.els1.x86_64",
          "CentOS-8.4:tar-2:1.30-5.el8.tuxcare.els2.x86_64",
          "CentOS-8.4:tar-2:1.30-5.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-48367"
        }
      ],
      "release_date": "2025-07-07T15:25:00Z",
      "remediations": [
        {
          "category": "no_fix_planned",
          "details": "This issue is denial-of-service only (client starvation) with no confidentiality or integrity impact, and it is exploitable only if an attacker can make direct TCP connections to the Redis service port. Redis enables protected mode by default and rejects remote unauthenticated connections unless explicitly configured otherwise, so instances bound to localhost or internal interfaces are inherently not susceptible to the unauthenticated trigger. Given the limited impact and the requirement for direct network reachability to a typically non-public port, this can be safely deprioritized in centrally managed server/VM deployments.",
          "product_ids": [
            "CentOS-8.4:tar-2:1.30-5.el8.tuxcare.els1.x86_64",
            "CentOS-8.4:tar-2:1.30-5.el8.tuxcare.els2.x86_64",
            "CentOS-8.4:tar-2:1.30-5.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:tar-2:1.30-5.el8.tuxcare.els1.x86_64",
            "CentOS-8.4:tar-2:1.30-5.el8.tuxcare.els2.x86_64",
            "CentOS-8.4:tar-2:1.30-5.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}