First published: Tue Oct 29 2024(Updated: )
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote client closes the connection before waitress has had the opportunity to call getpeername() waitress won't correctly clean up the connection leading to the main thread attempting to write to a socket that no longer exists, but not removing it from the list of sockets to attempt to process. This leads to a busy-loop calling the write function. A remote attacker could run waitress out of available sockets with very little resources required. Waitress 3.0.1 contains fixes that remove the race condition.
Affected Software | Affected Version | How to fix |
---|---|---|
Waitress | <3.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2322461 is classified as moderate.
To fix REDHAT-BUG-2322461, update Waitress to version 3.0.1 or later.
All versions of Waitress prior to 3.0.1 are affected by REDHAT-BUG-2322461.
REDHAT-BUG-2322461 can cause Waitress to attempt writing to a socket that no longer exists, leading to potential application instability.
There is no known workaround for REDHAT-BUG-2322461; upgrading to the fixed version is recommended.