php-pear is vulnerable to symlink attack. It was found that the “pear” command created temporary files in an insecure way when installing packages. A malicious, local user could use this flaw to conduct a symbolic link attack, allowing them to overwrite the contents of arbitrary files accessible to the victim running the pear install
command.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=546164
news.php.net/php.pear.cvs/61264
openwall.com/lists/oss-security/2011/02/28/12
openwall.com/lists/oss-security/2011/02/28/3
openwall.com/lists/oss-security/2011/02/28/5
openwall.com/lists/oss-security/2011/03/01/4
openwall.com/lists/oss-security/2011/03/01/5
openwall.com/lists/oss-security/2011/03/01/7
openwall.com/lists/oss-security/2011/03/01/8
openwall.com/lists/oss-security/2011/03/01/9
pear.php.net/advisory-20110228.txt
pear.php.net/bugs/bug.php?id=18056
secunia.com/advisories/43533
security-tracker.debian.org/tracker/CVE-2011-1072
svn.php.net/viewvc?view=revision&revision=308687
www.mandriva.com/security/advisories?name=MDVSA-2011:187
www.redhat.com/support/errata/RHSA-2011-1741.html
www.securityfocus.com/bid/46605
access.redhat.com/errata/RHSA-2011:1741
access.redhat.com/security/updates/classification/#low
exchange.xforce.ibmcloud.com/vulnerabilities/65721