Eventlet is a concurrent networking library for Python. A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process.
References
Configurations
History
07 Nov 2023, 03:30
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
27 May 2021, 22:34
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5JZP4LZOSP7CUAM3GIRW6PIAWKH5VGB/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WJFSBPLCNSZNHYQC4QDRDFRTEZRMD2L/ - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* |
25 May 2021, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 May 2021, 17:02
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.3 |
References | (CONFIRM) https://github.com/eventlet/eventlet/security/advisories/GHSA-9p9m-jm8w-94p2 - Third Party Advisory | |
CPE | cpe:2.3:a:eventlet:eventlet:*:*:*:*:*:*:*:* |
07 May 2021, 18:30
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-400 |
07 May 2021, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-05-07 15:15
Updated : 2023-12-10 13:55
NVD link : CVE-2021-21419
Mitre link : CVE-2021-21419
CVE.ORG link : CVE-2021-21419
JSON object : View
Products Affected
fedoraproject
- fedora
eventlet
- eventlet
CWE
CWE-400
Uncontrolled Resource Consumption