{"id":"RLSA-2026:1628","summary":"Important: php security update","details":"PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.\n\nSecurity Fix(es):\n\n* php: heap-based buffer overflow in array_merge() (CVE-2025-14178)\n\n* php: PHP: Information disclosure via getimagesize() function when reading multi-chunk images (CVE-2025-14177)\n\n* php: PHP: Denial of Service via invalid character sequence in PDO PostgreSQL prepared statement (CVE-2025-14180)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-05T10:00:10.494911Z","published":"2026-02-05T09:13:02.090882Z","upstream":["CVE-2025-14177","CVE-2025-14178","CVE-2025-14180"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2026:1628"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425627"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425625"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425626"}],"affected":[{"package":{"name":"php","ecosystem":"Rocky Linux:10","purl":"pkg:rpm/rocky-linux/php?distro=rocky-linux-10&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.3.29-1.el10_1"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2026:1628.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}