Eventlet is a concurrent networking library for Python. A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process.
References
Link | Resource |
---|---|
https://github.com/eventlet/eventlet/security/advisories/GHSA-9p9m-jm8w-94p2 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5JZP4LZOSP7CUAM3GIRW6PIAWKH5VGB/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WJFSBPLCNSZNHYQC4QDRDFRTEZRMD2L/ | Mailing List Third Party Advisory |
Information
Published : 2021-05-07 08:15
Updated : 2021-05-27 15:34
NVD link : CVE-2021-21419
Mitre link : CVE-2021-21419
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
eventlet
- eventlet
fedoraproject
- fedora