Bug 2425627 (CVE-2025-14180) - CVE-2025-14180 php: PHP: Denial of Service via invalid character sequence in PDO PostgreSQL prepared statement
Summary: CVE-2025-14180 php: PHP: Denial of Service via invalid character sequence in ...
Keywords:
Status: NEW
Alias: CVE-2025-14180
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2425721 2425722
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-12-27 20:01 UTC by OSIDB Bzimport
Modified: 2026-02-02 01:48 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:1169 0 None None None 2026-01-26 10:24:26 UTC
Red Hat Product Errata RHSA-2026:1185 0 None None None 2026-01-26 11:36:00 UTC
Red Hat Product Errata RHSA-2026:1187 0 None None None 2026-01-26 12:05:44 UTC
Red Hat Product Errata RHSA-2026:1190 0 None None None 2026-01-26 12:47:44 UTC
Red Hat Product Errata RHSA-2026:1409 0 None None None 2026-01-27 17:55:33 UTC
Red Hat Product Errata RHSA-2026:1412 0 None None None 2026-01-27 17:30:05 UTC
Red Hat Product Errata RHSA-2026:1429 0 None None None 2026-01-27 19:25:53 UTC
Red Hat Product Errata RHSA-2026:1628 0 None None None 2026-02-02 01:48:42 UTC

Description OSIDB Bzimport 2025-12-27 20:01:16 UTC
In PHP versions 8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1 when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled, an invalid character sequence (such as \x99) in a prepared statement parameter may cause the quoting function PQescapeStringConn to return NULL, leading to a null pointer dereference in pdo_parse_params() function. This may lead to crashes (segmentation fault) and affect the availability of the target server.

Comment 1 errata-xmlrpc 2026-01-26 10:24:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:1169 https://access.redhat.com/errata/RHSA-2026:1169

Comment 2 errata-xmlrpc 2026-01-26 11:35:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:1185 https://access.redhat.com/errata/RHSA-2026:1185

Comment 3 errata-xmlrpc 2026-01-26 12:05:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:1187 https://access.redhat.com/errata/RHSA-2026:1187

Comment 4 errata-xmlrpc 2026-01-26 12:47:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:1190 https://access.redhat.com/errata/RHSA-2026:1190

Comment 5 errata-xmlrpc 2026-01-27 17:30:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:1412 https://access.redhat.com/errata/RHSA-2026:1412

Comment 6 errata-xmlrpc 2026-01-27 17:55:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:1409 https://access.redhat.com/errata/RHSA-2026:1409

Comment 7 errata-xmlrpc 2026-01-27 19:25:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:1429 https://access.redhat.com/errata/RHSA-2026:1429

Comment 8 errata-xmlrpc 2026-02-02 01:48:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:1628 https://access.redhat.com/errata/RHSA-2026:1628


Note You need to log in before you can comment on or make changes to this bug.