OESA-2025-2232

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2232
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2232.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2025-2232
Upstream
Published
2025-09-12T14:24:22Z
Modified
2025-09-12T19:01:05.904649Z
Summary
python-eventlet security update
Details

Eventlet is a concurrent networking library for Python that allows you to change how you run your code, not how you write it.

Security Fix(es):

Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.(CVE-2025-58068)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:24.03-LTS / python-eventlet

Package

Name
python-eventlet
Purl
pkg:rpm/openEuler/python-eventlet&distro=openEuler-24.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.33.3-3.oe2403

Ecosystem specific

{
    "noarch": [
        "python-eventlet-help-0.33.3-3.oe2403.noarch.rpm",
        "python3-eventlet-0.33.3-3.oe2403.noarch.rpm"
    ],
    "src": [
        "python-eventlet-0.33.3-3.oe2403.src.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2025-2232.json"