First published: Tue Dec 01 2020(Updated: )
It was discovered that PEAR incorrectly sanitized filenames. A remote attacker could possibly use this issue to execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/php-pear | <1:1.10.9+submodules+notgz-1ubuntu0.20.10.1 | 1:1.10.9+submodules+notgz-1ubuntu0.20.10.1 |
Ubuntu | =20.10 | |
All of | ||
ubuntu/php-pear | <1:1.10.9+submodules+notgz-1ubuntu0.20.04.1 | 1:1.10.9+submodules+notgz-1ubuntu0.20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/php-pear | <1:1.10.5+submodules+notgz-1ubuntu1.18.04.2 | 1:1.10.5+submodules+notgz-1ubuntu1.18.04.2 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/php-pear | <1:1.10.1+submodules+notgz-6ubuntu0.2 | 1:1.10.1+submodules+notgz-6ubuntu0.2 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4654-1 is considered high due to the potential for remote code execution.
To fix USN-4654-1, you should update the php-pear package to the latest versione as specified in the advisory.
USN-4654-1 affects Ubuntu versions 16.04, 18.04, 20.04, and 20.10 that have vulnerable php-pear installations.
There are no recommended workarounds for USN-4654-1; applying the updates is the best course of action.
Exploiting USN-4654-1 could allow attackers to execute arbitrary code, compromising the security and integrity of the affected systems.