CVE-2014-5459
Publication date 27 September 2014
Last updated 18 December 2024
Ubuntu priority
The PEAR_REST class in REST.php in PEAR in PHP through 5.6.0 allows local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions.
Status
Package | Ubuntu Release | Status |
---|---|---|
php-pear | 24.10 oracular |
Vulnerable, fix deferred
|
24.04 LTS noble |
Vulnerable, fix deferred
|
|
22.04 LTS jammy |
Vulnerable, fix deferred
|
|
20.04 LTS focal |
Vulnerable, fix deferred
|
|
18.04 LTS bionic |
Vulnerable, fix deferred
|
|
16.04 LTS xenial |
Vulnerable, fix deferred
|
|
14.04 LTS trusty | Not in release | |
php5 | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Ignored end of ESM support, was deferred [2022-03-08] | |
Notes
jdstrand
Upstream states this is a known issue
sbeattie
upstream claims fixed in 1.9.2, but still uses /tmp/pear/ according to debian bug report
mdeslaur
1.9.2+ only a DoS
rodrigo-zaiden
No complete fix was provided as of 2022-03-08.