Ubuntu alert USN-4723-1 (php-pear)
| From: | Marc Deslauriers <marc.deslauriers@canonical.com> | |
| To: | "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> | |
| Subject: | [USN-4723-1] PEAR vulnerability | |
| Date: | Mon, 08 Feb 2021 09:07:23 -0500 | |
| Message-ID: | <786fb2d6-4800-fe3e-8617-3b23df84126f@canonical.com> |
========================================================================== Ubuntu Security Notice USN-4723-1 February 08, 2021 php-pear vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: PEAR could be made to overwrite files as the administrator. Software Description: - php-pear: PHP Extension and Application Repository Details: It was discovered that PEAR incorrectly handled symbolic links in archives. A remote attacker could possibly use this issue to execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: php-pear 1:1.10.9+submodules+notgz-1ubuntu0.20.10.2 Ubuntu 20.04 LTS: php-pear 1:1.10.9+submodules+notgz-1ubuntu0.20.04.2 Ubuntu 18.04 LTS: php-pear 1:1.10.5+submodules+notgz-1ubuntu1.18.04.3 Ubuntu 16.04 LTS: php-pear 1:1.10.1+submodules+notgz-6ubuntu0.3 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4723-1 CVE-2020-36193 Package Information: https://launchpad.net/ubuntu/+source/php-pear/1:1.10.9+su... https://launchpad.net/ubuntu/+source/php-pear/1:1.10.9+su... https://launchpad.net/ubuntu/+source/php-pear/1:1.10.5+su... https://launchpad.net/ubuntu/+source/php-pear/1:1.10.1+su... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...
