Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-31015

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-31 May, 2022 | 22:50
Updated At-22 Apr, 2025 | 17:55
Rejected At-
Credits

Uncaught Exception (due to a data race) leads to process termination in Waitress

Waitress is a Web Server Gateway Interface server for Python 2 and 3. Waitress versions 2.1.0 and 2.1.1 may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an exception that is not handled and then causing the entire application to be killed. This issue has been fixed in Waitress 2.1.2 by no longer allowing the WSGI thread to close the socket. Instead, that is always delegated to the main thread. There is no work-around for this issue. However, users using waitress behind a reverse proxy server are less likely to have issues if the reverse proxy always reads the full response.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:31 May, 2022 | 22:50
Updated At:22 Apr, 2025 | 17:55
Rejected At:
▼CVE Numbering Authority (CNA)
Uncaught Exception (due to a data race) leads to process termination in Waitress

Waitress is a Web Server Gateway Interface server for Python 2 and 3. Waitress versions 2.1.0 and 2.1.1 may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an exception that is not handled and then causing the entire application to be killed. This issue has been fixed in Waitress 2.1.2 by no longer allowing the WSGI thread to close the socket. Instead, that is always delegated to the main thread. There is no work-around for this issue. However, users using waitress behind a reverse proxy server are less likely to have issues if the reverse proxy always reads the full response.

Affected Products
Vendor
Pylons
Product
waitress
Versions
Affected
  • >= 2.1.0, < 2.1.2
Problem Types
TypeCWE IDDescription
CWECWE-248CWE-248: Uncaught Exception
CWECWE-362CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Type: CWE
CWE ID: CWE-248
Description: CWE-248: Uncaught Exception
Type: CWE
CWE ID: CWE-362
Description: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Metrics
VersionBase scoreBase severityVector
3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/Pylons/waitress/security/advisories/GHSA-f5x9-8jwc-25rw
x_refsource_CONFIRM
https://github.com/Pylons/waitress/issues/374
x_refsource_MISC
https://github.com/Pylons/waitress/pull/377
x_refsource_MISC
https://github.com/Pylons/waitress/commit/4f6789b035610e0552738cdc4b35ca809a592d48
x_refsource_MISC
Hyperlink: https://github.com/Pylons/waitress/security/advisories/GHSA-f5x9-8jwc-25rw
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/Pylons/waitress/issues/374
Resource:
x_refsource_MISC
Hyperlink: https://github.com/Pylons/waitress/pull/377
Resource:
x_refsource_MISC
Hyperlink: https://github.com/Pylons/waitress/commit/4f6789b035610e0552738cdc4b35ca809a592d48
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/Pylons/waitress/security/advisories/GHSA-f5x9-8jwc-25rw
x_refsource_CONFIRM
x_transferred
https://github.com/Pylons/waitress/issues/374
x_refsource_MISC
x_transferred
https://github.com/Pylons/waitress/pull/377
x_refsource_MISC
x_transferred
https://github.com/Pylons/waitress/commit/4f6789b035610e0552738cdc4b35ca809a592d48
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/Pylons/waitress/security/advisories/GHSA-f5x9-8jwc-25rw
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/Pylons/waitress/issues/374
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/Pylons/waitress/pull/377
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/Pylons/waitress/commit/4f6789b035610e0552738cdc4b35ca809a592d48
Resource:
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:31 May, 2022 | 23:15
Updated At:14 Jun, 2022 | 19:12

Waitress is a Web Server Gateway Interface server for Python 2 and 3. Waitress versions 2.1.0 and 2.1.1 may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an exception that is not handled and then causing the entire application to be killed. This issue has been fixed in Waitress 2.1.2 by no longer allowing the WSGI thread to close the socket. Instead, that is always delegated to the main thread. There is no work-around for this issue. However, users using waitress behind a reverse proxy server are less likely to have issues if the reverse proxy always reads the full response.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Secondary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
Type: Primary
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CPE Matches

agendaless
agendaless
>>waitress>>Versions from 2.1.0(inclusive) to 2.1.2(exclusive)
cpe:2.3:a:agendaless:waitress:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-248Primarysecurity-advisories@github.com
CWE-362Primarysecurity-advisories@github.com
CWE ID: CWE-248
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-362
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/Pylons/waitress/commit/4f6789b035610e0552738cdc4b35ca809a592d48security-advisories@github.com
Patch
Third Party Advisory
https://github.com/Pylons/waitress/issues/374security-advisories@github.com
Exploit
Issue Tracking
Patch
Third Party Advisory
https://github.com/Pylons/waitress/pull/377security-advisories@github.com
Issue Tracking
Patch
Third Party Advisory
https://github.com/Pylons/waitress/security/advisories/GHSA-f5x9-8jwc-25rwsecurity-advisories@github.com
Third Party Advisory
Hyperlink: https://github.com/Pylons/waitress/commit/4f6789b035610e0552738cdc4b35ca809a592d48
Source: security-advisories@github.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/Pylons/waitress/issues/374
Source: security-advisories@github.com
Resource:
Exploit
Issue Tracking
Patch
Third Party Advisory
Hyperlink: https://github.com/Pylons/waitress/pull/377
Source: security-advisories@github.com
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: https://github.com/Pylons/waitress/security/advisories/GHSA-f5x9-8jwc-25rw
Source: security-advisories@github.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found