Eventlet is a concurrent networking library for Python. A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process.
References
Configurations
History
21 Nov 2024, 05:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/eventlet/eventlet/security/advisories/GHSA-9p9m-jm8w-94p2 - Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2WJFSBPLCNSZNHYQC4QDRDFRTEZRMD2L/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5JZP4LZOSP7CUAM3GIRW6PIAWKH5VGB/ - |
07 Nov 2023, 03:30
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-05-07 15:15
Updated : 2024-11-21 05:48
NVD link : CVE-2021-21419
Mitre link : CVE-2021-21419
CVE.ORG link : CVE-2021-21419
JSON object : View
Products Affected
eventlet
- eventlet
fedoraproject
- fedora
CWE
CWE-400
Uncontrolled Resource Consumption