It was discovered that PEAR incorrectly handled symbolic links in archives. A remote attacker could possibly use this issue to execute arbitrary code.
{ "binaries": [ { "binary_name": "php-pear", "binary_version": "1:1.10.1+submodules+notgz-6ubuntu0.3" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "php-pear", "binary_version": "1:1.10.5+submodules+notgz-1ubuntu1.18.04.3" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "php-pear", "binary_version": "1:1.10.9+submodules+notgz-1ubuntu0.20.04.2" } ], "availability": "No subscription required" }