Eventlet is a concurrent networking library for Python. A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process.

Project Subscriptions

Vendors Products
Eventlet Subscribe
Eventlet Subscribe
Fedoraproject Subscribe
Openshift Subscribe
Openstack Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0072 Eventlet is a concurrent networking library for Python. A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process.
Github GHSA Github GHSA GHSA-9p9m-jm8w-94p2 Improper Handling of Highly Compressed Data (Data Amplification) and Memory Allocation with Excessive Size Value in eventlet
Ubuntu USN Ubuntu USN USN-4956-1 Eventlet vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-03T18:09:16.080Z

Reserved: 2020-12-22T00:00:00

Link: CVE-2021-21419

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-05-07T15:15:07.407

Modified: 2024-11-21T05:48:19.403

Link: CVE-2021-21419

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-05-06T00:00:00Z

Links: CVE-2021-21419 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses