First published: Thu May 06 2021(Updated: )
### Impact A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. ### Patches Version 0.31.0 restricts websocket frame to reasonable limits. ### Workarounds Restricting memory usage via OS limits would help against overall machine exhaustion. No workaround to protect Eventlet process. ### For more information If you have any questions or comments about this advisory: * Open an issue in [eventlet](https://github.com/eventlet/eventlet/issues) * Contact current maintainers. At 2021-03: temotor@gmail.com or https://t.me/temotor
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-eventlet | <0:0.25.2-4.el8 | 0:0.25.2-4.el8 |
redhat/python-eventlet | <0:0.25.2-5.el8 | 0:0.25.2-5.el8 |
Eventlet Eventlet | >=0.10<0.31.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
redhat/eventlet | <0.31.0 | 0.31.0 |
pip/eventlet | >=0.10<0.31.0 | 0.31.0 |
Fedora | =33 | |
Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21419 has a medium severity rating due to the potential for memory exhaustion from large websocket frames.
To fix CVE-2021-21419, upgrade to Eventlet version 0.31.0 or later.
CVE-2021-21419 affects Eventlet versions prior to 0.31.0, primarily in applications using Python with Eventlet.
Yes, CVE-2021-21419 can be exploited remotely by a malicious websocket peer sending oversized frames.
The impact of CVE-2021-21419 is significant memory exhaustion on the Eventlet side, potentially leading to denial of service.