First published: Wed Nov 02 2022(Updated: )
The php-pear package contains the PHP Extension and Application Repository (PEAR), a framework and distribution system for reusable PHP components.<br>Security Fix(es):<br><li> Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948)</li> <li> Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949)</li> <li> Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/php-pear | <1.9.4-23.el7_9 | 1.9.4-23.el7_9 |
redhat/php-pear | <1.9.4-23.el7_9 | 1.9.4-23.el7_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2022:7340 has been classified as a high severity vulnerability due to the potential for unserialization attacks.
The vulnerability affects the php-pear package in versions prior to 1.9.4-23.el7_9.
To fix RHSA-2022:7340, you should update the php-pear package to version 1.9.4-23.el7_9 or later.
RHSA-2022:7340 allows for an unserialization attack due to the improper handling of PHAR files.
There are currently no known workarounds for RHSA-2022:7340, so updating the package is the recommended approach.