Source: python-eventlet
Version: 0.40.1-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/eventlet/eventlet/pull/1062
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for python-eventlet.

CVE-2025-58068[0]:
| Eventlet is a concurrent networking library for Python. Prior to
| version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP
| Request Smuggling due to improper handling of HTTP trailer sections.
| This vulnerability could enable attackers to, bypass front-end
| security controls, launch targeted attacks against active site
| users, and poison web caches. This problem has been patched in
| Eventlet 0.40.3 by dropping trailers which is a breaking change if a
| backend behind eventlet.wsgi proxy requires trailers. A workaround
| involves not using eventlet.wsgi facing untrusted clients.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-58068
    https://www.cve.org/CVERecord?id=CVE-2025-58068
[1] https://github.com/eventlet/eventlet/pull/1062
[2] https://github.com/eventlet/eventlet/security/advisories/GHSA-hw6f-rjfj-j7j7
[3] 
https://github.com/eventlet/eventlet/commit/0bfebd1117d392559e25b4bfbfcc941754de88fb

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to