Bug 2092246 (CVE-2022-31015)

Summary: CVE-2022-31015 waitress: uncaught Exception (due to a data race) leads to process termination
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: amctagga, aoconnor, bdettelb, bniver, eglynn, flucifre, gmeno, infra-sig, jjoyce, lhh, lorenzo.gil.sanchez, mbenjamin, mburns, mhackett, rbean, sostapov, spower, vereddy
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: waitress 2.1.2 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-06-02 07:10:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2254404    
Bug Blocks: 2092250    

Description TEJ RATHI 2022-06-01 07:44:01 UTC
Waitress versions 2.1.0 and 2.1.1 may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an exception that is not handled and then causing the entire application to be killed. 

This issue has been fixed in Waitress 2.1.2 by no longer allowing the WSGI thread to close the socket. Instead, that is always delegated to the main thread. There is no work-around for this issue. However, users using waitress behind a reverse proxy server are less likely to have issues if the reverse proxy always reads the full response.

https://github.com/Pylons/waitress/pull/377
https://github.com/Pylons/waitress/issues/374
https://github.com/Pylons/waitress/security/advisories/GHSA-f5x9-8jwc-25rw
https://github.com/Pylons/waitress/commit/4f6789b035610e0552738cdc4b35ca809a592d48