A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame.
Version 0.31.0 restricts websocket frame to reasonable limits.
Restricting memory usage via OS limits would help against overall machine exhaustion. No workaround to protect Eventlet process.
If you have any questions or comments about this advisory:
github.com/eventlet/eventlet/commit/1412f5e4125b4313f815778a1acb4d3336efcd07
github.com/eventlet/eventlet/security/advisories/GHSA-9p9m-jm8w-94p2
lists.fedoraproject.org/archives/list/[email protected]/message/2WJFSBPLCNSZNHYQC4QDRDFRTEZRMD2L
lists.fedoraproject.org/archives/list/[email protected]/message/R5JZP4LZOSP7CUAM3GIRW6PIAWKH5VGB
nvd.nist.gov/vuln/detail/CVE-2021-21419