{"id":"CVE-2021-21419","details":"Eventlet is a concurrent networking library for Python. A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process.","aliases":["GHSA-9p9m-jm8w-94p2","PYSEC-2021-12"],"modified":"2026-03-10T23:30:00.712771296Z","published":"2021-05-07T15:15:07.407Z","related":["MGASA-2021-0266","SUSE-SU-2021:2554-1","SUSE-SU-2021:3729-1"],"references":[{"type":"WEB"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2WJFSBPLCNSZNHYQC4QDRDFRTEZRMD2L/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5JZP4LZOSP7CUAM3GIRW6PIAWKH5VGB/"},{"type":"ADVISORY","url":"https://github.com/eventlet/eventlet/security/advisories/GHSA-9p9m-jm8w-94p2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/eventlet/eventlet","events":[{"introduced":"b0969fc156700b84eefa554bea65088486c104de"},{"fixed":"f717f382d0bfb5cf084a9e69737fa6dfcb2eb5cf"}],"database_specific":{"versions":[{"introduced":"0.10"},{"fixed":"0.31.0"}]}}],"versions":["v0.10","v0.11","v0.12","v0.13","v0.14","v0.15","v0.15.1","v0.15.2","v0.16","v0.16.1","v0.17","v0.17.1","v0.17.2","v0.17.3","v0.17.4","v0.18.0","v0.18.1","v0.18.2","v0.18.4","v0.19.0","v0.20.0","v0.20.1","v0.21.0","v0.22.0","v0.22.1","v0.23.0","v0.24.0","v0.24.1","v0.25.0","v0.25.1","v0.25.2","v0.26.0","v0.26.1","v0.27.0","v0.28.0","v0.28.1","v0.29.0","v0.29.1","v0.30.0","v0.30.1","v0.30.2","v0.30.3"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-21419.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}