It was discovered that PEAR incorrectly handled symbolic links in archives. A remote attacker could possibly use this issue to execute arbitrary code.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1:1.10.1+submodules+notgz-6ubuntu0.3", "binary_name": "php-pear" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1:1.10.5+submodules+notgz-1ubuntu1.18.04.3", "binary_name": "php-pear" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1:1.10.9+submodules+notgz-1ubuntu0.20.04.2", "binary_name": "php-pear" } ] }