CVE-2024-49769: Waitress vulnerable to DoS leading to high CPU usage/resource exhaustion
When a remote client closes the connection before waitress has had the opportunity to call getpeername()
waitress won’t correctly clean up the connection leading to the main thread attempting to write to a socket that no longer exists, but not removing it from the list of sockets to attempt to process. This leads to a busy-loop calling the write function.
A remote attacker could run waitress out of available sockets with very little resources required.
References
Detect and mitigate CVE-2024-49769 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →