First published: Tue Feb 14 2023(Updated: )
[Unknown description]
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/php-dompdf | <2.0.2+dfsg-1<2.0.0 | 2.0.2+dfsg-1 2.0.0 |
ubuntu/php-dompdf | <0.6.1+dfsg-2ubuntu1+ | 0.6.1+dfsg-2ubuntu1+ |
ubuntu/php-dompdf | <0.6.2+dfsg-3ubuntu0.18.04.1~ | 0.6.2+dfsg-3ubuntu0.18.04.1~ |
ubuntu/php-dompdf | <0.6.2+dfsg-3ubuntu0.20.04.1 | 0.6.2+dfsg-3ubuntu0.20.04.1 |
ubuntu/php-dompdf | <0.6.2+dfsg-3.1ubuntu0.1 | 0.6.2+dfsg-3.1ubuntu0.1 |
debian/php-dompdf | <=0.6.2+dfsg-3<=0.6.2+dfsg-3.1 | 0.6.2+dfsg-3+deb10u2 2.0.3+dfsg-1 2.0.4+dfsg-1 |
composer/dompdf/dompdf | <2.0.0 | 2.0.0 |
Dompdf | <2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3838 is a vulnerability related to the deserialization of untrusted data using PHAR deserialization.
CVE-2021-3838 affects the php-dompdf package in various versions of Debian and Ubuntu.
The severity of CVE-2021-3838 is yet to be determined, but it is recommended to apply the available remedies to mitigate the vulnerability.
To fix CVE-2021-3838, it is recommended to update the php-dompdf package to the specified versions or apply the relevant security patches provided by the distribution.
You can find more information about CVE-2021-3838 on the GitHub page of dompdf and the related reference links.