{"id":"BIT-libphp-2025-14178","summary":"Heap buffer overflow in array_merge()","details":"In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, a heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE, due to an integer overflow in the precomputation of element counts using zend_hash_num_elements(). This may lead to memory corruption or crashes and affect the integrity and availability of the target server.","aliases":["BIT-php-2025-14178","BIT-php-min-2025-14178","CVE-2025-14178","GHSA-h96m-rvf9-jgm2"],"modified":"2026-01-26T17:30:50.455778Z","published":"2026-01-08T11:43:28.412Z","database_specific":{"cpes":["cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"],"severity":"High"},"references":[{"type":"WEB","url":"https://github.com/php/php-src/security/advisories/GHSA-h96m-rvf9-jgm2"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-14178"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2026/01/msg00019.html"}],"affected":[{"package":{"name":"libphp","ecosystem":"Bitnami","purl":"pkg:bitnami/libphp"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"8.1.34"},{"introduced":"8.2.0"},{"fixed":"8.2.30"},{"introduced":"8.3.0"},{"fixed":"8.3.29"},{"introduced":"8.4.0"},{"fixed":"8.4.16"},{"introduced":"8.5.0"},{"fixed":"8.5.1"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/libphp/BIT-libphp-2025-14178.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}]}],"schema_version":"1.7.3"}