alsa-2025:7418
Vulnerability from osv_almalinux
Published
2025-05-13 00:00
Modified
2025-07-02 13:02
Summary
Important: php:8.3 security update
Details
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
- php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217)
- php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736)
- php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734)
- php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219)
- php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861)
- php: Reference counting in php_request_shutdown causes Use-After-Free (CVE-2024-11235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "apcu-panel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5.1.23-1.module_el9.6.0+151+5f31e576"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-bcmath"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-cli"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-dba"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-dbg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-embedded"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-enchant"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-ffi"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-fpm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-gd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-gmp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-intl"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-ldap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-mbstring"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-mysqlnd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-odbc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-opcache"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-pdo"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-pecl-apcu"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5.1.23-1.module_el9.6.0+151+5f31e576"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-pecl-apcu-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5.1.23-1.module_el9.6.0+151+5f31e576"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-pecl-redis6"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.1.0-2.module_el9.6.0+151+5f31e576"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-pecl-rrd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.0.3-4.module_el9.6.0+151+5f31e576"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-pecl-xdebug3"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.3.1-1.module_el9.6.0+151+5f31e576"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-pecl-zip"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.22.3-1.module_el9.6.0+151+5f31e576"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-pgsql"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-process"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-snmp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-soap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "php-xml"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.3.19-1.module_el9.6.0+166+f262c21c"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. \n\nSecurity Fix(es): \n\n * php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217)\n * php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736)\n * php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734)\n * php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219)\n * php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861)\n * php: Reference counting in php_request_shutdown causes Use-After-Free (CVE-2024-11235)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:7418",
"modified": "2025-07-02T13:02:35Z",
"published": "2025-05-13T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:7418"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-11235"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-1217"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-1219"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-1734"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-1736"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-1861"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2355917"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2356041"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2356042"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2356043"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2356046"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2357531"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2025-7418.html"
}
],
"related": [
"CVE-2025-1217",
"CVE-2025-1736",
"CVE-2025-1734",
"CVE-2025-1219",
"CVE-2025-1861",
"CVE-2024-11235"
],
"summary": "Important: php:8.3 security update"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…