{"schema_version": "1.7.0", "id": "RLSA-2026:1628", "modified": "2026-02-05T09:14:22.797088Z", "published": "2026-02-05T09:13:02.090882Z", "upstream": ["CVE-2025-14177", "CVE-2025-14178", "CVE-2025-14180"], "summary": "Important: php security update", "details": "PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.\n\nSecurity Fix(es):\n\n* php: heap-based buffer overflow in array_merge() (CVE-2025-14178)\n\n* php: PHP: Information disclosure via getimagesize() function when reading multi-chunk images (CVE-2025-14177)\n\n* php: PHP: Denial of Service via invalid character sequence in PDO PostgreSQL prepared statement (CVE-2025-14180)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}], "affected": [{"package": {"ecosystem": "Rocky Linux:10", "name": "php", "purl": "pkg:rpm/rocky-linux/php?distro=rocky-linux-10&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:8.3.29-1.el10_1"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2026:1628"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425627"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425625"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425626"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}