{"api_version":"1","generated_at":"2026-04-23T02:37:15+00:00","cve":"CVE-2022-31015","urls":{"html":"https://cve.report/CVE-2022-31015","api":"https://cve.report/api/cve/CVE-2022-31015.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-31015","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-31015"},"summary":{"title":"CVE-2022-31015","description":"Waitress is a Web Server Gateway Interface server for Python 2 and 3. Waitress versions 2.1.0 and 2.1.1 may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an exception that is not handled and then causing the entire application to be killed. This issue has been fixed in Waitress 2.1.2 by no longer allowing the WSGI thread to close the socket. Instead, that is always delegated to the main thread. There is no work-around for this issue. However, users using waitress behind a reverse proxy server are less likely to have issues if the reverse proxy always reads the full response.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-05-31 23:15:00","updated_at":"2022-06-14 19:12:00"},"problem_types":["CWE-362","CWE-248"],"metrics":[],"references":[{"url":"https://github.com/Pylons/waitress/commit/4f6789b035610e0552738cdc4b35ca809a592d48","name":"https://github.com/Pylons/waitress/commit/4f6789b035610e0552738cdc4b35ca809a592d48","refsource":"MISC","tags":[],"title":"Merge pull request #377 from Pylons/bugfix/select-closed-socket-race · Pylons/waitress@4f6789b · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Pylons/waitress/pull/377","name":"https://github.com/Pylons/waitress/pull/377","refsource":"MISC","tags":[],"title":"Bugfix: Don't close socket in the WSGI thread, delegate it back to the main thread! by bertjwregeer · Pull Request #377 · Pylons/waitress · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Pylons/waitress/issues/374","name":"https://github.com/Pylons/waitress/issues/374","refsource":"MISC","tags":[],"title":"Possible race condition leading to the main loop dying? · Issue #374 · Pylons/waitress · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Pylons/waitress/security/advisories/GHSA-f5x9-8jwc-25rw","name":"https://github.com/Pylons/waitress/security/advisories/GHSA-f5x9-8jwc-25rw","refsource":"CONFIRM","tags":[],"title":"Uncaught Exception (due to a data race) leads to process termination · Advisory · Pylons/waitress · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-31015","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31015","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"31015","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"agendaless","cpe5":"waitress","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-31015","qid":"183592","title":"Debian Security Update for waitress (CVE-2022-31015)"},{"cve":"CVE-2022-31015","qid":"502586","title":"Alpine Linux Security Update for py3-waitress"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-31015","STATE":"PUBLIC","TITLE":"Uncaught Exception (due to a data race) leads to process termination in Waitress"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"waitress","version":{"version_data":[{"version_value":">= 2.1.0, < 2.1.2"}]}}]},"vendor_name":"Pylons"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Waitress is a Web Server Gateway Interface server for Python 2 and 3. Waitress versions 2.1.0 and 2.1.1 may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an exception that is not handled and then causing the entire application to be killed. This issue has been fixed in Waitress 2.1.2 by no longer allowing the WSGI thread to close the socket. Instead, that is always delegated to the main thread. There is no work-around for this issue. However, users using waitress behind a reverse proxy server are less likely to have issues if the reverse proxy always reads the full response."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-248: Uncaught Exception"}]},{"description":[{"lang":"eng","value":"CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"}]}]},"references":{"reference_data":[{"name":"https://github.com/Pylons/waitress/security/advisories/GHSA-f5x9-8jwc-25rw","refsource":"CONFIRM","url":"https://github.com/Pylons/waitress/security/advisories/GHSA-f5x9-8jwc-25rw"},{"name":"https://github.com/Pylons/waitress/issues/374","refsource":"MISC","url":"https://github.com/Pylons/waitress/issues/374"},{"name":"https://github.com/Pylons/waitress/pull/377","refsource":"MISC","url":"https://github.com/Pylons/waitress/pull/377"},{"name":"https://github.com/Pylons/waitress/commit/4f6789b035610e0552738cdc4b35ca809a592d48","refsource":"MISC","url":"https://github.com/Pylons/waitress/commit/4f6789b035610e0552738cdc4b35ca809a592d48"}]},"source":{"advisory":"GHSA-f5x9-8jwc-25rw","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-05-31 23:15:00","lastModifiedDate":"2022-06-14 19:12:00","problem_types":["CWE-362","CWE-248"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:agendaless:waitress:*:*:*:*:*:*:*:*","versionStartIncluding":"2.1.0","versionEndExcluding":"2.1.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}