Eventlet 0.15

CPE Details

Eventlet 0.15
0.15
2021-05-12
14h48 +00:00
2021-05-13
16h35 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:eventlet:eventlet:0.15:*:*:*:*:*:*:*

Informations

Vendor

eventlet

Product

eventlet

Version

0.15

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-58068 2025-08-29 20h15 +00:00 Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.
9.1
Critical
CVE-2021-21419 2021-05-07 12h30 +00:00 Eventlet is a concurrent networking library for Python. A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process.
5.3
Medium