|
|
Subscribe / Log in / New account

Mageia alert MGASA-2021-0266 (python-eventlet)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2021-0266: Updated python-eventlet packages fix security vulnerability
Date:  Fri, 18 Jun 2021 21:25:51 +0200
Message-ID:  <20210618192551.905F09FDEC@duvel.mageia.org>
Archive-link:  Article

MGASA-2021-0266 - Updated python-eventlet packages fix security vulnerability Publication date: 18 Jun 2021 URL: https://advisories.mageia.org/MGASA-2021-0266.html Type: security Affected Mageia releases: 7, 8 CVE: CVE-2021-21419 Description: Updated python-eventlet packages fix a security vulnerability: Eventlet is a concurrent networking library for Python. A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process (CVE-2021-21419). References: - https://bugs.mageia.org/show_bug.cgi?id=29009 - https://ubuntu.com/security/notices/USN-4956-1 - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2... SRPMS: - 7/core/python-eventlet-0.24.1-1.1.mga7 - 8/core/python-eventlet-0.31.0-1.mga8


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds