RedHat: RHSA-2021-5071:01 Moderate: Red Hat OpenStack Platform 16.1

Advisories

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat OpenStack Platform 16.1 (python-eventlet) security update
Advisory ID:       RHSA-2021:5071-01
Product:           Red Hat OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:5071
Issue date:        2021-12-09
CVE Names:         CVE-2021-21419 
=====================================================================

1. Summary:

An update for python-eventlet is now available for Red Hat OpenStack
Platform 16.1 (Train).

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 16.1 - noarch

3. Description:

Eventlet is a networking library written in Python. It achieves high
scalability by using non-blocking io while at the same time retaining high
programmer usability by using coroutines to make the non-blocking io
operations appear blocking at the source code
level.

Security Fix(es):

* improper handling of highly compressed data and memory allocation with
excessive size allows DoS (CVE-2021-21419)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1958407 - CVE-2021-21419 python-eventlet: improper handling of highly compressed data and memory allocation with excessive size allows DoS

6. Package List:

Red Hat OpenStack Platform 16.1:

Source:
python-eventlet-0.25.2-5.el8ost.1.src.rpm

noarch:
python3-eventlet-0.25.2-5.el8ost.1.noarch.rpm

Red Hat OpenStack Platform 16.1:

Source:
python-eventlet-0.25.2-5.el8ost.1.src.rpm

noarch:
python3-eventlet-0.25.2-5.el8ost.1.noarch.rpm

Red Hat OpenStack Platform 16.1:

Source:
python-eventlet-0.25.2-5.el8ost.1.src.rpm

noarch:
python3-eventlet-0.25.2-5.el8ost.1.noarch.rpm

Red Hat OpenStack Platform 16.1:

Source:
python-eventlet-0.25.2-5.el8ost.1.src.rpm

noarch:
python3-eventlet-0.25.2-5.el8ost.1.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-21419
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=AAKw
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-5071:01 Moderate: Red Hat OpenStack Platform 16.1

An update for python-eventlet is now available for Red Hat OpenStack Platform 16.1 (Train)

Summary

Eventlet is a networking library written in Python. It achieves high scalability by using non-blocking io while at the same time retaining high programmer usability by using coroutines to make the non-blocking io operations appear blocking at the source code level.
Security Fix(es):
* improper handling of highly compressed data and memory allocation with excessive size allows DoS (CVE-2021-21419)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.

Solution

For details on how to apply this update, which includes the changesdescribed in this advisory, refer to:https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2021-21419 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat OpenStack Platform 16.1:
Source: python-eventlet-0.25.2-5.el8ost.1.src.rpm
noarch: python3-eventlet-0.25.2-5.el8ost.1.noarch.rpm
Red Hat OpenStack Platform 16.1:
Source: python-eventlet-0.25.2-5.el8ost.1.src.rpm
noarch: python3-eventlet-0.25.2-5.el8ost.1.noarch.rpm
Red Hat OpenStack Platform 16.1:
Source: python-eventlet-0.25.2-5.el8ost.1.src.rpm
noarch: python3-eventlet-0.25.2-5.el8ost.1.noarch.rpm
Red Hat OpenStack Platform 16.1:
Source: python-eventlet-0.25.2-5.el8ost.1.src.rpm
noarch: python3-eventlet-0.25.2-5.el8ost.1.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

Severity
Advisory ID: RHSA-2021:5071-01
Product: Red Hat OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2021:5071
Issued Date: : 2021-12-09
CVE Names: CVE-2021-21419

Topic

An update for python-eventlet is now available for Red Hat OpenStackPlatform 16.1 (Train).Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.

Relevant Releases Architectures

Red Hat OpenStack Platform 16.1 - noarch

Bugs Fixed

1958407 - CVE-2021-21419 python-eventlet: improper handling of highly compressed data and memory allocation with excessive size allows DoS

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.