Name | CVE-2023-28858 |
Description | redis-py before 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request in an off-by-one manner. NOTE: this CVE Record was initially created in response to reports about ChatGPT, and 4.3.6, 4.4.3, and 4.5.3 were released (changing the behavior for pipeline operations); however, please see CVE-2023-28859 about addressing data leakage across AsyncIO connections in general. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1033754 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
python-redis (PTS) | bullseye | 3.5.3-2 | fixed |
trixie, sid, bookworm | 4.3.4-3 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
python-redis | source | buster | (not affected) | |||
python-redis | source | bullseye | (not affected) | |||
python-redis | source | (unstable) | (unfixed) | 1033754 |
[bookworm] - python-redis <no-dsa> (Minor issue)
[bullseye] - python-redis <not-affected> (Vulnerable code not present)
[buster] - python-redis <not-affected> (Vulnerable code introduced later)
https://github.com/redis/redis-py/issues/2624
https://github.com/redis/redis-py/pull/2641
https://openai.com/blog/march-20-chatgpt-outage
Async support added in v4.2.0
When fixing this issue make sure to apply complete fixes (cf. CVE-2023-28859
CVE entry) to not open CVE-2023-28859.