[USN-4723-1] PEAR vulnerability
Marc Deslauriers
marc.deslauriers at canonical.com
Mon Feb 8 14:07:23 UTC 2021
==========================================================================
Ubuntu Security Notice USN-4723-1
February 08, 2021
php-pear vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
PEAR could be made to overwrite files as the administrator.
Software Description:
- php-pear: PHP Extension and Application Repository
Details:
It was discovered that PEAR incorrectly handled symbolic links in archives.
A remote attacker could possibly use this issue to execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.10:
php-pear 1:1.10.9+submodules+notgz-1ubuntu0.20.10.2
Ubuntu 20.04 LTS:
php-pear 1:1.10.9+submodules+notgz-1ubuntu0.20.04.2
Ubuntu 18.04 LTS:
php-pear 1:1.10.5+submodules+notgz-1ubuntu1.18.04.3
Ubuntu 16.04 LTS:
php-pear 1:1.10.1+submodules+notgz-6ubuntu0.3
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4723-1
CVE-2020-36193
Package Information:
https://launchpad.net/ubuntu/+source/php-pear/1:1.10.9+submodules+notgz-1ubuntu0.20.10.2
https://launchpad.net/ubuntu/+source/php-pear/1:1.10.9+submodules+notgz-1ubuntu0.20.04.2
https://launchpad.net/ubuntu/+source/php-pear/1:1.10.5+submodules+notgz-1ubuntu1.18.04.3
https://launchpad.net/ubuntu/+source/php-pear/1:1.10.1+submodules+notgz-6ubuntu0.3
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20210208/8b50874e/attachment.sig>
More information about the ubuntu-security-announce
mailing list