GHSA-9p9m-jm8w-94p2

Suggest an improvement
Source
https://github.com/advisories/GHSA-9p9m-jm8w-94p2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-9p9m-jm8w-94p2/GHSA-9p9m-jm8w-94p2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-9p9m-jm8w-94p2
Aliases
Published
2021-05-07T15:50:36Z
Modified
2024-09-20T17:24:34.530879Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
Improper Handling of Highly Compressed Data (Data Amplification) and Memory Allocation with Excessive Size Value in eventlet
Details

Impact

A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame.

Patches

Version 0.31.0 restricts websocket frame to reasonable limits.

Workarounds

Restricting memory usage via OS limits would help against overall machine exhaustion. No workaround to protect Eventlet process.

For more information

If you have any questions or comments about this advisory: * Open an issue in eventlet * Contact current maintainers. At 2021-03: temotor@gmail.com or https://t.me/temotor

References

Affected packages

PyPI / eventlet

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.10
Fixed
0.31.0

Affected versions

0.*

0.10.0
0.11.0
0.12.1
0.13.0
0.14.0
0.15.2
0.16.1
0.17.4
0.18.2
0.18.3
0.18.4
0.19.0
0.20.0
0.20.1
0.21.0
0.22.0
0.22.1
0.23.0
0.24.0
0.24.1
0.25.0
0.25.1
0.25.2
0.26.0
0.26.1
0.27.0
0.28.0
0.28.1
0.29.0
0.29.1
0.30.0
0.30.1
0.30.2
0.30.3

Ecosystem specific

{
    "affected_functions": [
        "eventlet.websocket.WebSocket",
        "eventlet.websocket.WebSocketWSGI"
    ]
}