Bug 2425626 (CVE-2025-14177)
| Summary: | CVE-2025-14177 php: PHP: Information disclosure via getimagesize() function when reading multi-chunk images | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | unspecified | CC: | jkoehler, lphiri, sdawley |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in PHP. The getimagesize() function may leak uninitialized heap memory when processing images in multi-chunk mode, such as through php://filter. This vulnerability, caused by a bug in php_read_stream_all_chunks() that overwrites the buffer without advancing the pointer, allows an attacker to potentially disclose sensitive information from the server's memory. This could compromise the confidentiality of data on the affected server.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
OSIDB Bzimport
2025-12-27 20:01:12 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:1412 https://access.redhat.com/errata/RHSA-2026:1412 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:1409 https://access.redhat.com/errata/RHSA-2026:1409 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:1429 https://access.redhat.com/errata/RHSA-2026:1429 This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:1628 https://access.redhat.com/errata/RHSA-2026:1628 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:2470 https://access.redhat.com/errata/RHSA-2026:2470 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:2799 https://access.redhat.com/errata/RHSA-2026:2799 |