CVE-2022-31015

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-31015
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-31015.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-31015
Aliases
Downstream
Related
Published
2022-05-31T22:50:12Z
Modified
2025-10-22T18:28:36.252346Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Uncaught Exception (due to a data race) leads to process termination in Waitress
Details

Waitress is a Web Server Gateway Interface server for Python 2 and 3. Waitress versions 2.1.0 and 2.1.1 may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an exception that is not handled and then causing the entire application to be killed. This issue has been fixed in Waitress 2.1.2 by no longer allowing the WSGI thread to close the socket. Instead, that is always delegated to the main thread. There is no work-around for this issue. However, users using waitress behind a reverse proxy server are less likely to have issues if the reverse proxy always reads the full response.

Database specific
{
    "cwe_ids": [
        "CWE-248",
        "CWE-362"
    ]
}
References

Affected packages

Git / github.com/pylons/waitress

Affected ranges

Type
GIT
Repo
https://github.com/pylons/waitress
Events

Affected versions

v2.*

v2.1.0
v2.1.1