CVE-2021-29476

NameCVE-2021-29476
DescriptionRequests is a HTTP library written in PHP. Requests mishandles deserialization in FilteredIterator. The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wordpress (PTS)buster, buster (security)5.0.15+dfsg1-0+deb10u1fixed
bullseye (security), bullseye5.7.5+dfsg1-0+deb11u1fixed
bookworm, sid6.0+dfsg1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wordpresssourcestretch4.7.19+dfsg-1+deb9u1
wordpresssourcebuster5.0.11+dfsg1-0+deb10u1
wordpresssource(unstable)5.5.3+dfsg1-1

Notes

https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54
https://github.com/rmccue/Requests/pull/421
https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3
The CVE directly correspond to CVE-2020-28032 for wordpress and we can track
same versions as fixed. Strictly speaking CVE-2021-29476 is for the PHP Requests
library directly.

Search for package or bug name: Reporting problems