{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2025-1217: fix handling of folded headers by the http stream parser\n- CVE-2025-1734: fix validation of http headers with missing colon\n- CVE-2025-1861: fix incorrect http redirect location truncation",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/rhel7els/advisories/2025/clsa-2025_1748639500.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1748639500",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1748639500"
      }
    ],
    "tracking": {
      "current_release_date": "2025-05-30T21:12:50Z",
      "generator": {
        "date": "2025-05-30T21:12:50Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1748639500",
      "initial_release_date": "2025-05-30T21:12:50Z",
      "revision_history": [
        {
          "date": "2025-05-30T21:12:50Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "php: Fix of 3 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7",
                "product": {
                  "name": "Red Hat Enterprise Linux 7",
                  "product_id": "Red-Hat-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "php-mysqlnd-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                "product": {
                  "name": "php-mysqlnd-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_id": "php-mysqlnd-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/php-mysqlnd@5.4.16-48.el7.tuxcare.els9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "php-common-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                "product": {
                  "name": "php-common-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_id": "php-common-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/php-common@5.4.16-48.el7.tuxcare.els9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "php-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                "product": {
                  "name": "php-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_id": "php-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/php@5.4.16-48.el7.tuxcare.els9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "php-pspell-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                "product": {
                  "name": "php-pspell-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_id": "php-pspell-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/php-pspell@5.4.16-48.el7.tuxcare.els9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "php-ldap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                "product": {
                  "name": "php-ldap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_id": "php-ldap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/php-ldap@5.4.16-48.el7.tuxcare.els9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "php-devel-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                "product": {
                  "name": "php-devel-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_id": "php-devel-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/php-devel@5.4.16-48.el7.tuxcare.els9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "php-process-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                "product": {
                  "name": "php-process-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_id": "php-process-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/php-process@5.4.16-48.el7.tuxcare.els9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "php-soap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                "product": {
                  "name": "php-soap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_id": "php-soap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/php-soap@5.4.16-48.el7.tuxcare.els9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "php-snmp-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                "product": {
                  "name": "php-snmp-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_id": "php-snmp-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/php-snmp@5.4.16-48.el7.tuxcare.els9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "php-mbstring-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                "product": {
                  "name": "php-mbstring-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_id": "php-mbstring-0:5.4.16-48.el7.tuxcare.els9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/php-mbstring@5.4.16-48.el7.tuxcare.els9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "php-mysqlnd-0:5.4.16-48.el7.tuxcare.els9.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:php-mysqlnd-0:5.4.16-48.el7.tuxcare.els9.x86_64"
        },
        "product_reference": "php-mysqlnd-0:5.4.16-48.el7.tuxcare.els9.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "php-common-0:5.4.16-48.el7.tuxcare.els9.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:php-common-0:5.4.16-48.el7.tuxcare.els9.x86_64"
        },
        "product_reference": "php-common-0:5.4.16-48.el7.tuxcare.els9.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "php-0:5.4.16-48.el7.tuxcare.els9.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:php-0:5.4.16-48.el7.tuxcare.els9.x86_64"
        },
        "product_reference": "php-0:5.4.16-48.el7.tuxcare.els9.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "php-pspell-0:5.4.16-48.el7.tuxcare.els9.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:php-pspell-0:5.4.16-48.el7.tuxcare.els9.x86_64"
        },
        "product_reference": "php-pspell-0:5.4.16-48.el7.tuxcare.els9.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "php-ldap-0:5.4.16-48.el7.tuxcare.els9.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:php-ldap-0:5.4.16-48.el7.tuxcare.els9.x86_64"
        },
        "product_reference": "php-ldap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "php-devel-0:5.4.16-48.el7.tuxcare.els9.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:php-devel-0:5.4.16-48.el7.tuxcare.els9.x86_64"
        },
        "product_reference": "php-devel-0:5.4.16-48.el7.tuxcare.els9.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "php-process-0:5.4.16-48.el7.tuxcare.els9.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:php-process-0:5.4.16-48.el7.tuxcare.els9.x86_64"
        },
        "product_reference": "php-process-0:5.4.16-48.el7.tuxcare.els9.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "php-soap-0:5.4.16-48.el7.tuxcare.els9.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:php-soap-0:5.4.16-48.el7.tuxcare.els9.x86_64"
        },
        "product_reference": "php-soap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "php-snmp-0:5.4.16-48.el7.tuxcare.els9.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:php-snmp-0:5.4.16-48.el7.tuxcare.els9.x86_64"
        },
        "product_reference": "php-snmp-0:5.4.16-48.el7.tuxcare.els9.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "php-mbstring-0:5.4.16-48.el7.tuxcare.els9.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:php-mbstring-0:5.4.16-48.el7.tuxcare.els9.x86_64"
        },
        "product_reference": "php-mbstring-0:5.4.16-48.el7.tuxcare.els9.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-11234",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "description",
          "text": "In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and \"request_fulluri\" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:php-mysqlnd-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-common-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-pspell-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-ldap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-devel-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-process-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-soap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-snmp-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-mbstring-0:5.4.16-48.el7.tuxcare.els9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-11234"
        },
        {
          "category": "external",
          "summary": "https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm7-mmq2",
          "url": "https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm7-mmq2"
        }
      ],
      "release_date": "2024-11-24T01:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:php-mysqlnd-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-common-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-pspell-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-ldap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-devel-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-process-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-soap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-snmp-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-mbstring-0:5.4.16-48.el7.tuxcare.els9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-11233",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error in convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:php-mysqlnd-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-common-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-pspell-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-ldap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-devel-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-process-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-soap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-snmp-0:5.4.16-48.el7.tuxcare.els9.x86_64",
          "Red-Hat-7:php-mbstring-0:5.4.16-48.el7.tuxcare.els9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-11233"
        },
        {
          "category": "external",
          "summary": "https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43",
          "url": "https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43"
        }
      ],
      "release_date": "2024-11-24T02:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:php-mysqlnd-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-common-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-pspell-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-ldap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-devel-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-process-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-soap-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-snmp-0:5.4.16-48.el7.tuxcare.els9.x86_64",
            "Red-Hat-7:php-mbstring-0:5.4.16-48.el7.tuxcare.els9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    }
  ]
}