Bug 2092246 (CVE-2022-31015) - CVE-2022-31015 waitress: uncaught Exception (due to a data race) leads to process termination
Summary: CVE-2022-31015 waitress: uncaught Exception (due to a data race) leads to pro...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2022-31015
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2254404
Blocks: 2092250
TreeView+ depends on / blocked
 
Reported: 2022-06-01 07:44 UTC by TEJ RATHI
Modified: 2023-12-13 19:13 UTC (History)
18 users (show)

Fixed In Version: waitress 2.1.2
Doc Type: No Doc Update
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-06-02 07:10:56 UTC
Embargoed:


Attachments (Terms of Use)

Description TEJ RATHI 2022-06-01 07:44:01 UTC
Waitress versions 2.1.0 and 2.1.1 may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an exception that is not handled and then causing the entire application to be killed. 

This issue has been fixed in Waitress 2.1.2 by no longer allowing the WSGI thread to close the socket. Instead, that is always delegated to the main thread. There is no work-around for this issue. However, users using waitress behind a reverse proxy server are less likely to have issues if the reverse proxy always reads the full response.

https://github.com/Pylons/waitress/pull/377
https://github.com/Pylons/waitress/issues/374
https://github.com/Pylons/waitress/security/advisories/GHSA-f5x9-8jwc-25rw
https://github.com/Pylons/waitress/commit/4f6789b035610e0552738cdc4b35ca809a592d48


Note You need to log in before you can comment on or make changes to this bug.