<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for python-waitress</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:3876-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-11-01T15:29:32Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-11-01T15:29:32Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-11-01T15:29:32Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for python-waitress</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for python-waitress fixes the following issues:

- CVE-2024-49768: Fixed request processing race condition in HTTP pipelining with invalid first request when lookahead is enabled (bsc#1232556)
- CVE-2024-49769: Fixed incorrect connection clean up leads to a busy-loop and resource exhaustion (bsc#1232554)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-3876,SUSE-SLE-Module-Python3-15-SP5-2024-3876,SUSE-SLE-Module-Python3-15-SP6-2024-3876,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3876,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3876,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3876,openSUSE-SLE-15.5-2024-3876</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243876-1/</URL>
      <Description>Link for SUSE-SU-2024:3876-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-November/019754.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:3876-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232554</URL>
      <Description>SUSE Bug 1232554</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232556</URL>
      <Description>SUSE Bug 1232556</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49768/</URL>
      <Description>SUSE CVE CVE-2024-49768 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49769/</URL>
      <Description>SUSE CVE CVE-2024-49769 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" CPE="cpe:/o:suse:sle_hpc-espos:15:sp4">SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp4">SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Python 3 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Python 3 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Python 3 15 SP5" CPE="cpe:/o:suse:sle-module-python3:15:sp5">SUSE Linux Enterprise Module for Python 3 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Python 3 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Python 3 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Python 3 15 SP6" CPE="cpe:/o:suse:sle-module-python3:15:sp6">SUSE Linux Enterprise Module for Python 3 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP4-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp4">SUSE Linux Enterprise Server 15 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python311-waitress-2.1.2-150400.12.7.1">
      <FullProductName ProductID="python311-waitress-2.1.2-150400.12.7.1">python311-waitress-2.1.2-150400.12.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python311-waitress-doc-2.1.2-150400.12.7.1">
      <FullProductName ProductID="python311-waitress-doc-2.1.2-150400.12.7.1">python311-waitress-doc-2.1.2-150400.12.7.1</FullProductName>
    </Branch>
    <Relationship ProductReference="python311-waitress-2.1.2-150400.12.7.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-waitress-2.1.2-150400.12.7.1">python311-waitress-2.1.2-150400.12.7.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="python311-waitress-doc-2.1.2-150400.12.7.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-waitress-doc-2.1.2-150400.12.7.1">python311-waitress-doc-2.1.2-150400.12.7.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="python311-waitress-2.1.2-150400.12.7.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-waitress-2.1.2-150400.12.7.1">python311-waitress-2.1.2-150400.12.7.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="python311-waitress-doc-2.1.2-150400.12.7.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-waitress-doc-2.1.2-150400.12.7.1">python311-waitress-doc-2.1.2-150400.12.7.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="python311-waitress-2.1.2-150400.12.7.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Python 3 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Python 3 15 SP5:python311-waitress-2.1.2-150400.12.7.1">python311-waitress-2.1.2-150400.12.7.1 as a component of SUSE Linux Enterprise Module for Python 3 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="python311-waitress-doc-2.1.2-150400.12.7.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Python 3 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Python 3 15 SP5:python311-waitress-doc-2.1.2-150400.12.7.1">python311-waitress-doc-2.1.2-150400.12.7.1 as a component of SUSE Linux Enterprise Module for Python 3 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="python311-waitress-2.1.2-150400.12.7.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Python 3 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Python 3 15 SP6:python311-waitress-2.1.2-150400.12.7.1">python311-waitress-2.1.2-150400.12.7.1 as a component of SUSE Linux Enterprise Module for Python 3 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="python311-waitress-doc-2.1.2-150400.12.7.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Python 3 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Python 3 15 SP6:python311-waitress-doc-2.1.2-150400.12.7.1">python311-waitress-doc-2.1.2-150400.12.7.1 as a component of SUSE Linux Enterprise Module for Python 3 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="python311-waitress-2.1.2-150400.12.7.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP4-LTSS:python311-waitress-2.1.2-150400.12.7.1">python311-waitress-2.1.2-150400.12.7.1 as a component of SUSE Linux Enterprise Server 15 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="python311-waitress-doc-2.1.2-150400.12.7.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP4-LTSS:python311-waitress-doc-2.1.2-150400.12.7.1">python311-waitress-doc-2.1.2-150400.12.7.1 as a component of SUSE Linux Enterprise Server 15 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="python311-waitress-2.1.2-150400.12.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:python311-waitress-2.1.2-150400.12.7.1">python311-waitress-2.1.2-150400.12.7.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="python311-waitress-doc-2.1.2-150400.12.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:python311-waitress-doc-2.1.2-150400.12.7.1">python311-waitress-doc-2.1.2-150400.12.7.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may send a request that is exactly recv_bytes (defaults to 8192) long, followed by a secondary request using HTTP pipelining. When request lookahead is disabled (default) we won't read any more requests, and when the first request fails due to a parsing error, we simply close the connection. However when request lookahead is enabled, it is possible to process and receive the first request, start sending the error message back to the client while we read the next request and queue it. This will allow the secondary request to be serviced by the worker thread while the connection should be closed. Waitress 3.0.1 fixes the race condition. As a workaround, disable channel_request_lookahead, this is set to 0 by default disabling this feature.</Note>
    </Notes>
    <CVE>CVE-2024-49768</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-waitress-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-waitress-doc-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-waitress-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-waitress-doc-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP5:python311-waitress-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP5:python311-waitress-doc-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:python311-waitress-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:python311-waitress-doc-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:python311-waitress-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:python311-waitress-doc-2.1.2-150400.12.7.1</ProductID>
        <ProductID>openSUSE Leap 15.5:python311-waitress-2.1.2-150400.12.7.1</ProductID>
        <ProductID>openSUSE Leap 15.5:python311-waitress-doc-2.1.2-150400.12.7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243876-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49768.html</URL>
        <Description>CVE-2024-49768</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232556</URL>
        <Description>SUSE Bug 1232556</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote client closes the connection before waitress has had the opportunity to call getpeername() waitress won't correctly clean up the connection leading to the main thread attempting to write to a socket that no longer exists, but not removing it from the list of sockets to attempt to process. This leads to a busy-loop calling the write function. A remote attacker could run waitress out of available sockets with very little resources required. Waitress 3.0.1 contains fixes that remove the race condition.</Note>
    </Notes>
    <CVE>CVE-2024-49769</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-waitress-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-waitress-doc-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-waitress-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-waitress-doc-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP5:python311-waitress-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP5:python311-waitress-doc-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:python311-waitress-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Python 3 15 SP6:python311-waitress-doc-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:python311-waitress-2.1.2-150400.12.7.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:python311-waitress-doc-2.1.2-150400.12.7.1</ProductID>
        <ProductID>openSUSE Leap 15.5:python311-waitress-2.1.2-150400.12.7.1</ProductID>
        <ProductID>openSUSE Leap 15.5:python311-waitress-doc-2.1.2-150400.12.7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243876-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49769.html</URL>
        <Description>CVE-2024-49769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232554</URL>
        <Description>SUSE Bug 1232554</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
