File _patchinfo of Package patchinfo.39648
<patchinfo incident="39648">
<issue tracker="cve" id="2025-1220"/>
<issue tracker="cve" id="2025-1735"/>
<issue tracker="cve" id="2025-6491"/>
<issue tracker="bnc" id="1246167">VUL-0: CVE-2025-1220: php53,php7,php8: unprocessed null bytes in hostnames can lead to SSRF</issue>
<issue tracker="bnc" id="1246146">VUL-0: CVE-2025-1735: php53,php7,php8: pgsql extension does not properly handle errors within escape functions</issue>
<issue tracker="bnc" id="1246148">VUL-0: CVE-2025-6491: php53,php7,php8: NULL pointer dereference when processing a SoapVar with a fully qualified name that is longer than 2G</issue>
<packager>pgajdos</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for php7</summary>
<description>This update for php7 fixes the following issues:
- CVE-2025-1220: Fixed null byte termination in hostnames (bsc#1246167)
- CVE-2025-1735: Fixed pgsql extension does not check for errors during escaping (bsc#1246146)
- CVE-2025-6491: Fixed NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix (bsc#1246148)
</description>
</patchinfo>